CN103746756A - Primary user emulation attack-based interference estimation method for cognitive radio network - Google Patents

Primary user emulation attack-based interference estimation method for cognitive radio network Download PDF

Info

Publication number
CN103746756A
CN103746756A CN201410005815.9A CN201410005815A CN103746756A CN 103746756 A CN103746756 A CN 103746756A CN 201410005815 A CN201410005815 A CN 201410005815A CN 103746756 A CN103746756 A CN 103746756A
Authority
CN
China
Prior art keywords
channel
user
cognitive radio
information source
interference
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410005815.9A
Other languages
Chinese (zh)
Other versions
CN103746756B (en
Inventor
李方伟
冯德俊
朱江
李立
余航
马安君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing University of Post and Telecommunications
Original Assignee
Chongqing University of Post and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing University of Post and Telecommunications filed Critical Chongqing University of Post and Telecommunications
Priority to CN201410005815.9A priority Critical patent/CN103746756B/en
Publication of CN103746756A publication Critical patent/CN103746756A/en
Application granted granted Critical
Publication of CN103746756B publication Critical patent/CN103746756B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to the technical field of cognitive radio spectrum management and safety, in particular to a primary user emulation attack-based interference estimation method for a cognitive radio network. The method comprises the steps that a secondary user receives channel power, the channel power is utilized to detect whether any channel in the cognitive radio network is occupied, and the channel occupation state and the channel power are sent to a cluster head; the cluster head is used for judging whether the occupied channel is attacked; the interference energy distribution of the attacked channel is estimated. According to the method disclosed by the invention, the secondary user detects whether a malicious user exists in a channel and estimates the interference energy distribution of the malicious user by perceiving the surrounding radio environment, an interference situation graph is built further, the energy of the primary user and the energy of the malicious user is separated, the interference energy distribution of the malicious user can be obtained, and also an accurate spectrum situation graph can be obtained by combining with a spectrum hole detection means.

Description

The interference estimation method of cognitive radio networks based on simulated main customer attack
Technical field
The present invention relates to cognitive radio frequency spectrum management and safe practice field, the particularly interference estimation method of cognitive radio networks based on simulated main customer attack, by the estimation of the identification to information source identity and interfering energy, builds the interference situation of malicious user.
Background technology
Along with scientific and technical development, frequency spectrum resource growing tension, even (also claim primary user but current spectrum management mode is authorized user, Primary User, be called for short PU) not during use authority frequency range, unauthorized user (also claims to trust time user, Secondary User, be called for short SU) can not use this frequency range, this situation has greatly reduced again the utilance of frequency spectrum.In order to solve this contradiction, people have proposed cognitive radio (Cognitive Radio, being called for short CR) technology-unauthorized user perceives idle frequency range by frequency spectrum perception algorithm, under the prerequisite that does not affect authorized user communication, makes full use of frequency spectrum resource.The trust mentioned in this method time user is trusted user, and to send to all data of bunch head are all True Datas or calculate gained according to True Data to trust time user, do not pass through any malicious modification.
But, in frequency spectrum access procedure, also introduced some new safety problems.Such as: counterfeit main customer attack (Primary User Emulation Attack, be called for short PUEA), be malicious user (Malicious User, be called for short MU) send the signal of simulated main customer signal, mislead trust time user and think it is that primary user is in transmitted signal, thereby judge that channel is taken by primary user, and can not use this channel.
For the research of PUEA, mainly concentrate on single trust time user and how to detect attack at present, and the impact of not attacking from large-scale angle analysis, and formulate corresponding counte-rplan.For example, for counterfeit main customer attack, the anti-Attack Research that existing document proposes is all in sending and receiving end, to add some matching algorithms, as HASH function, primary user's energy fingerprint etc., avoids bogus attack impact to trust time user and correctly judges that whether channel is idle.These methods have guaranteed the right of eminent domain to all idle channels substantially, but for the channel that has malicious user, if disturbing situation to distribute to without distinction to it, channel allocation center trusts time user, even if time user of the trust in interference range has obtained this channel so, still can not use safely channel because of disturbing excessive, thereby reduce the fail safe of cognition network communication.
On the one hand, when how whether research detect attack and exist, it is significant to frequency spectrum perception safety equally that the distribution situation of energy is attacked in research.On the other hand, how systematically, excavate reliably usable spectrum cavity in network, it is one of key realizing cognitive radio technology, frequency spectrum situation map refers to image in cognitive radio, presents intuitively " the frequency spectrum map " of frequency spectrum cavity-pocket, more existing literature research are without the frequency spectrum situation map of attacking, when there is simulated main customer attack so, this situation map is because can not distinguish the energy of primary user and malicious user, and make system lose the right of eminent domain of the channel to bogus attack, reduced power system capacity.
Summary of the invention
For solving above technical problem, the present invention proposes the interference estimation method of cognitive radio networks based on simulated main customer attack.
The interference estimation method of cognitive radio networks of the present invention based on simulated main customer attack, comprise: trust time user's receive channel power, utilize any one channel in channel power detection cognitive radio networks whether occupied, channel occupancy state and channel power are sent to a bunch head; Bunch head judges whether occupied channel is attacked; Estimation is distributed by the interfering energy of attack channel.
Preferably, whether described to utilize channel power to detect any one channel in cognitive radio networks occupied, comprising: if there is P on this channel rk-T m< σ, determines that this channel is that doubtful primary user takies, wherein T mfor interference threshold, P rkbe k channel power of trusting the channel r that time user receives.
Preferably, described bunch of head judges that whether occupied channel is attacked, and comprising:
The channel occupancy situation of each user's judgement that bunch head sends according to each user judges whether this channel takies;
Bunch head obtains the number of the information source of occupied channel, according to the number of described information source, judges whether this channel is attacked.
Preferably, the channel occupancy situation that each user that described bunch of head sends according to each user judges judges whether this channel takies and comprises: if there is user to think that channel is that doubtful primary user takies, think that this channel is occupied, if all users think that channel is unoccupied, channel is idle condition.
Preferably, the number that described bunch of head obtains the information source of occupied channel adopts Gerschgorin radii method.
Preferably, the described number according to described information source judges whether this channel is to be comprised by attacking: if number n >=2 of information source, this channel is in counterfeit main customer attack.
Preferably, the described number according to described information source judges whether this channel is to be comprised by attacking: if the number n=1 of information source:
(1) first judge that whether this channel is in occupied state, if Δ P r'≤ε, this channel is occupied state;
In this formula, &Delta;P r &prime; = P r T 1 - P r T 2 = 26.16 [ log ( f 1 / f 2 ) ] - [ a 1 ( h re ) - a 2 ( h re ) ] , ε=26.16[log (f 1/ f 2)]-[a 1(h re)-a 2(h re)]+x n, wherein:
Figure BDA0000453748140000032
for period T 1at certain location point, to centre frequency, be f 1channel received power,
Figure BDA0000453748140000033
for period T 2at same position point, to centre frequency, be f 2channel received power, a 1(h re), a 2(h re) be portable antenna modifying factor, x nfor average system noise;
(2) judge whether this channel exists malicious interference user, if Δ P< is ε, there is malicious interference user in this channel again;
In this formula,
&Delta;P = ( | P 1 , T 1 f D 1 - P 1 , T 1 - 1 f i | + | P 2 , T 1 f D 1 - P 2 , T 1 - 1 f i | + . . . + | P k , T 1 f D 1 - P k , T 1 - 1 f i | + . . . + | P M , T 1 f D 1 - P M , T 1 - 1 f i | ) / M , F i∈ D-f d1, D is the set of all channels in working frequency range,
Figure BDA0000453748140000035
be k and trust time user at T 1individual sense cycle is interior to channel f d1energy sensing value, M refers to and trusts time user's number.
Preferably, described estimation is distributed and comprises coordinate and the transmitting power of estimating this channel malicious user by the interfering energy of attack channel, specifically comprises:
303-1A, estimate the Bo Dajiao of each information source at array antenna 1 place
Figure BDA0000453748140000036
bo Dajiao with array antenna 2 places
Figure BDA0000453748140000041
303-1B, according to information source i, at the ripple at array antenna 1 and 2 places, reach angle θ iand θ ' iand the coordinate (a of array antenna 1,2 1, b 1), (a 2, b 2), obtain the equation y of this malice information source place straight line i=tan θ i(x i-a 1)+b 1and y i=tan θ ' i(x i-a 1)+b 1;
303-1C, according to the equation of malice information source place straight line, obtain s the intersection point that comprises malice information source coordinate, the coordinate of definite malicious user from s intersection point, determines the transmitting power of malicious user.
Preferably, interfering energy is distributed and revised, comprise: in investigation region, be uniformly distributed some transducers, the received power error amount of calculating sensor position, error amount is adopted to interpolation method, calculate the error correction values between adjacent sensors position, the transmitting power at described channel malicious user coordinate place is revised.
Cognitive user of the present invention is by perception radio environment around, whether detect in channel has the interfering energy of malicious user and estimation malicious user to distribute, further set up and disturb situation map, by primary user's energy and malicious user energy separation, both can show that only embodying malicious user interfering energy distributes, and can combine with frequency spectrum cavity-pocket detection means and draw frequency spectrum situation map accurately again.
Accompanying drawing explanation
Fig. 1 is the network model figure of prior art;
Fig. 2 is the interference estimation method first preferred embodiment schematic flow sheet of cognitive radio networks of the present invention based on simulated main customer attack;
Fig. 3 is the step 301 preferred embodiment specific implementation schematic flow sheet of the interference estimation method of cognitive radio networks of the present invention based on simulated main customer attack;
Fig. 4 is the step 302 preferred embodiment specific implementation schematic flow sheet of the interference estimation method of cognitive radio networks of the present invention based on simulated main customer attack;
Fig. 5 is the step 303 preferred embodiment specific implementation schematic flow sheet of the interference estimation method of cognitive radio networks of the present invention based on simulated main customer attack;
Fig. 6 is the interference estimation method second preferred embodiment schematic flow sheet of cognitive radio networks of the present invention based on simulated main customer attack;
Fig. 7 is the interference situation map that adopts the interference estimation method of cognitive radio networks of the present invention based on simulated main customer attack to obtain;
Fig. 8 is the interference situation map that adopts prior art to obtain;
Fig. 9 adopts the interference estimation method of cognitive radio networks of the present invention based on simulated main customer attack and the relatively analogous diagram of power system capacity that adopts prior art.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is only the present invention's part embodiment, rather than whole embodiment.Based on the embodiment in the present invention, those of ordinary skills, not making the every other embodiment obtaining under creative work prerequisite, belong to the scope of protection of the invention.
Supposing to investigate region is a cognitive radio networks being comprised of L primary user (each primary user takies 1 channel), a M trust time user, a N malicious user and a pair of array antenna, as shown in Figure 1.Cognition network adopts collaborative spectrum sensing model, and the trust of certain area time user is combined into bunch automatically, and elects a bunch of head by election algorithm.Each SU is sent to a bunch head by detected energy value, by a bunch head, is unified to process.In general, the primary user in this network is mobile, trusts time user and can freely add or leave this cognition network, but can not move in testing process.
The interference estimation method of cognitive radio networks of the present invention based on simulated main customer attack, as shown in Figure 2, comprising:
Whether step 301, trust time user's receive channel power, utilize any one channel in channel power detection cognitive radio networks occupied, and channel occupancy state and channel power are sent to a bunch head;
Step 302, a bunch head judge whether occupied channel is attacked;
Step 303, estimation are distributed by the interfering energy in attack channel.
Below the execution mode of each step of the present invention is introduced.
Whether described step 301, trust time user's receive channel power, utilize any one channel in channel power detection cognitive radio networks occupied, and channel occupancy state and channel power are sent to a bunch head, specifically as shown in Figure 3, comprising:
301-1, for i channel in network, (be designated as f i), each trust time user SU kreceive this channel power P rk, judge whether this channel is that doubtful primary user takies;
Suppose that k is trusted time user SU kreceived power be designated as P rkif, channel f ion there is P rk>=T m, determine that this channel is that doubtful primary user takies, and is labeled as f di, otherwise determine that this channel is vacant.Wherein, T mfor interference threshold, its value is accepted modulating system and difference according to different cognitive users, its detailed establishing method is preferably referring to Li Yanlin, healthy and free from worry, Diao Yinliang, high formal guiding principle, Shi Dan. the expansion discussion of cognitive radio system intermediate-frequeney point thresholding. electric wave science journal, 2010,25 (9): 169-171
301-2, by received power P rkand the channel occupancy situation of this user's judgement sends to a bunch head.
No matter SU kwhether detect doubtful primary user and take, all need received power P rksend to a bunch head.
Described step 302, a bunch head judge that whether occupied channel is attacked, and specifically comprises the following steps:
Described bunch is the set being formed by the user's independent assortment in certain territorial scope, and described bunch of head is an optional user from this bunch; Described bunch and a bunch head are this area Common Concepts, repeat no more.As shown in Figure 4, specifically comprise:
The channel occupancy situation of each user's judgement that 302-1, bunch head send according to each user judges whether this channel takies;
According to the principle of the preferential use authority channel of primary user in cognitive radio, after bunch head obtains the channel occupancy situation of each user's judgement that in this bunch, each user sends, judge that whether this channel is occupied;
If there is user to think that channel is that doubtful primary user takies, think that this channel is occupied, if all users think that channel is unoccupied, channel is idle condition.If channel is idle condition, returns to step 301 and detect other channel.
302-2, bunch head obtain the number of the information source of occupied channel, according to the number of described information source, judge whether this channel is attacked;
302-2A, bunch head obtain the number of the information source of occupied channel
As a kind of execution mode, described bunch of head determined the channel f that doubtful primary user takies dithe number n of middle information source, judges the information source number of certain channel by each trust time user's the situation that reports.
As another kind of preferred implementation, described bunch of head determined the channel f that doubtful primary user takies dithe number n of middle information source, adopts Gerschgorin radii method to estimate the channel f that doubtful primary user takies dithe number n of middle information source
Described Gerschgorin radii method is referring to Cheng Zhiyou, Zuo Jingkun, and Liang Dong, etc. the Measurement of Harmonics in Power System [J] based on Gai Shi circle with TAM. East China University of Science's journal: natural science edition, 2012,38 (005): 612-616.
302-2B, according to the number of described information source, judge whether this channel is attacked
If number n >=2 of information source, this channel, in counterfeit main customer attack, because can not there are two primary users in a channel simultaneously, directly enters step 303.
If the number n=1 of information source, only has a user in channel, still can not determine primary user or malicious user, enter 302-2C.
For judging whether this channel is that malicious user takies, and the embodiment of the present invention provides two kinds of modes, described in following 302-2C and 302-2D, both can realize and judge whether this channel is that malicious user takies respectively.
As a kind of implementation, describedly judge that whether this channel is that malicious user takies, and comprising:
302-2C, judge whether this channel is that malicious user takies
(1) first judge that whether this channel is in occupied state
Because the position of malicious user and transmitting power are generally fixed, so in any two period T 1and T 2, the difference of the received power two different channels being transmitted at same position o'clock is only relevant with frequency,
&Delta;P r &prime; = P r T 1 - P r T 2 = 26.16 [ log ( f 1 / f 2 ) ] - [ a 1 ( h re ) - a 2 ( h re ) ] - - - ( 1 )
Wherein, a 1(h re), a 2(h re) be portable antenna modifying factor, f 1, f 2it is the centre frequency of these two channels.
So, by formula (1), if can obtain, detected that each SU is at T 1cycle is to channel f d1received power
Figure BDA0000453748140000072
with at T 1-1 cycle is to channel f d2received power
Figure BDA0000453748140000073
difference DELTA P r'≤ε, illustrates channel f d1in occupied state.Wherein, ε=26.16[log (f 1/ f 2)]-[a 1(h re)-a 2(h re)]+x n, x nfor average system noise.
(2) if this channel, in occupied state, then judges whether this channel exists malicious interference user.
Concrete detection algorithm is as follows:
Calculate current detection period T 1middle f d1on received power and last period T 1-1 this test point is at the mean value of the difference of the received power of other all channels:
&Delta;P = ( | P 1 , T 1 f D 1 - P 1 , T 1 - 1 f i | + | P 2 , T 1 f D 1 - P 2 , T 1 - 1 f i | + . . . + | P k , T 1 f D 1 - P k , T 1 - 1 f i | + . . . + | P M , T 1 f D 1 - P M , T 1 - 1 f i | ) / M - - - ( 2 )
In formula (2), f i∈ D-f d1, D is the set of all channels in working frequency range,
Figure BDA0000453748140000082
be k and trust time user at T 1individual sense cycle is interior to channel f d1energy sensing value, M refers to and trusts time user's number.
If Δ P>=ε, f d1from in other channels, be different primary user, there is not the counterfeit user of malice in this channel, proceeds the detection of next channel; If Δ P< is ε, f is described d1coincide with the energy fingerprint of certain channel, now f is described d1in channel, exist malicious user to take, wherein, ε=26.16[log (f 1/ f 2)]-[a 1(h re)-a 2(h re)]+x n, x nfor average system noise.
As another kind of implementation, describedly judge that whether this channel is that malicious user takies, and comprising:
The receiver of 302-2D, cognitive user receives the signal that similar authorized master user is sent, start detection PUE attacking system.In the time window of observing, physical layer time domain samples is first carried out to power spectral density calculating and try to achieve domain samples, then carry out wavelet decomposition.Because the variation of fading channel feature generally concentrates on low-frequency range, therefore, when particular dimensions reconstruct original signal, select low frequency part (approaching part), strengthen its correlation.Then extract the individual features of separation signal, use the support vector machine testing of the training of training vector.If testing result is f d1in channel, exist malicious user to take, specifically referring to Rong Hong. in a kind of cognitive radio, imitate authorized user and inveigle the detection method [J] of attacking. China switches from manufacturing military products to goods for civilian use, 2012,6:015.
When detecting that malicious user takies, determine that this channel is for to be attacked.
Can implementation as one, described step 303, estimate to be distributed by the interfering energy in attack channel, specifically as shown in Figure 5, comprise the following steps:
303-1, the coordinate of estimating this channel malicious user and transmitting power
303-1A, estimate the Bo Dajiao of each information source at array antenna 1 place bo Dajiao with array antenna 2 places
Figure BDA0000453748140000084
Estimate that ripple reaches angle and can adopt MUSIC algorithm, described MUSIC algorithm is shown in following list of references: Wang Yongliang, Chen Hui, Peng Yingning, ten thousand groups. Estimation of Spatial Spectrum theory and algorithm [M]. and Beijing: publishing house of Tsing-Hua University, 2013.Described ripple reaches angle and estimates also can adopt another kind of method, as follows described in list of references: Yan Fenggang, gold inscription, Qiao Xiaolin. and the transform domain two dimension ripple that is suitable for any array reaches angle Fast Estimation Algorithm [J]. electronic letters, vol, 2013.
303-1B, according to information source i, at the ripple at array antenna 1 and 2 places, reach angle θ iand θ ' iand the coordinate (a of array antenna 1,2 1, b 1), (a 2, b 2), obtain the equation y of this malice information source place straight line i=tan θ i(x i-a 1)+b 1and y i=tan θ ' i(x i-a 1)+b 1.
303-1C, according to the equation of malice information source place straight line, obtain s the intersection point that comprises malice information source coordinate, the coordinate of definite malicious user from s intersection point, determines the transmitting power of malicious user;
In s the intersection point that comprises malice information source coordinate, having s-n individual is not the coordinate of information source, below we pick out the coordinate of malicious user according to Di Li Cray principle and hypothesis testing algorithm.
Di Li Cray principle: m part article are put into the individual drawer of n (n<m) by any means, must have at least and be placed with two or two above article in a drawer.Application is in the present invention: in correct intersection point combination, contain and be not more than n-n 1+ 1 intersection point, on the direction finding line of array antenna l, or contains and is not more than n-n in this combination 2+ 1 intersection point is on the direction finding line of array antenna 2.
The number that step 302 has been tried to achieve the malicious user in this channel is n, and we are divided into this s intersection point the combination of n a group, total
Figure BDA0000453748140000091
plant combination.The 1st group of intersection point combination done to following detection: by step (21) known array antenna 1, have n 1bar direction finding line, n 1≤ n; If the number of hits of conllinear is more than n-n in this combination 1+ 1, do not meet Di Li Cray principle, so get rid of this combination.If the n of the 1st group of combination pair array antenna 1 1bar direction finding line meets Di Li Cray principle, then sees for array antenna 2 have n 2(n in the situation of bar direction finding line 2≤ n), in this combination, whether the number of hits of conllinear is greater than n-n 2+ 1, if be greater than, do not meet Di Li Cray principle, get rid of this combination.If meet, retain this combination, wait pending hypothesis testing.
To what be left identical detection is done in group combination, supposes, through the remaining C kind combination of above detection, to suppose every group of position that intersection point is all MU in remaining combination, and this C kind combination is carried out to hypothesis testing:
(1), to the 1st kind of combination, choose the received power P of n the SU that bunch head receives r1, P r2..., P rn, according to
Figure BDA0000453748140000093
calculate the transmitting power PT ' of n malicious user 1, PT ' 2..., PT ' n, then according to PT ' 1, PT ' 2..., PT ' ncalculate the received power P ' of an other L-n SU r1, P ' r2..., P ' r (L-n), and by P ' rkthe power P receiving with k SU rksubtract each other (i=1,2 ..., L-n), obtain the 1st Δ P ' r, &Delta;P &prime; r = &Sigma; i = M + 1 L P &prime; rk - P rk .
(2) remaining C-1 kind combination is done to same calculating and can obtain altogether afterwards multiple different Δ P ' r, preferably 10.
(3) by Δ P ' rthe coordinate of minimum that combination is defined as malicious user coordinate.
(4) by Δ P ' rminimum that group PT ' 1, PT ' 2..., PT ' nbe defined as the transmitting power of a required n malicious user.
Preferably, in order to reduce the error of calculation, n the malicious user SU of transmitting power PT ' that calculates malicious user will select the SU close to from calculative malicious user MU node.Because bunch head is known the position of each SU, also know the position of each group of MU node, so choose this n SU by bunch head according to result of calculation above.
The transmitting power that can be obtained malicious user by preceding step is PT ', preferably, can also revise the transmitting power of malicious user, to obtain the transmitting power of malicious user more accurately, further comprises:
Step 303-2: multiple transducers are evenly set, the received power error amount of calculating sensor position, error amount is adopted to interpolation method, calculate the error correction values between adjacent sensors position, transmitting power to channel malicious user coordinate place is revised, and the transmitting power that is about to relevant position is added.
If after free space decline and shadow fading, the theoretical received power of transducer is P r', by P r' actual value the P that receives with the transducer setting in advance rsubtract each other its poor Δ P rbe the error at this place, Δ P r=P r'-P r.To between the error amount of two adjacent transducers, evenly insert X value again, can obtain the error correction values of each position coordinates between two sensors, then the transmitting power at channel malicious user coordinate place is revised.
For example, the error at transducer 1 place is Δ P r1, the error at transducer 2 places is Δ P r2, the air line distance between transducer 1 and 2 is d,, on the straight line forming at the position coordinates of transducer 1 and transducer 2, from transducer 1 apart from d 1(d 1<d) error correction values of locating is
Figure BDA0000453748140000102
adopt in this way can the whole investigation of calculating place region error correction values.
Can implementation as another kind, described step 303, estimate to be distributed by the interfering energy in attack channel, adopt the interference temperature algorithm for estimating based on Kriging method.
In investigation region, a large amount of transducers is installed, due to each transducer present position difference, the interference temperature of its acquisition also can change according to the variation of locus, but due to the correlation of interference source transmitted signal, also there is certain spatial coherence in the interference temperature of each transducer present position.The interference temperature value that each transducer obtains, is the measured value of space variable model, according to measured value, uses Kriging method can estimate the interference temperature spatial distribution of investigating in region.Specifically referring to Publication about Document: Feng Wenjiang, Li Jun. the interference temperature spatial distribution based on Kriging method in cognitive radio is estimated [J]. the journal ISTIC EI of University Of Chongqing, 2011,34 (2).
Preferably, the interference estimation method of cognitive radio networks of the present invention based on simulated main customer attack, as shown in Figure 6, also comprise: step 304, build the interference situation map of this channel, this step is just for the interference exhibition method to channel is convenient to understand, be not to realize steps necessary of the present invention, it is specially:
1, the Distribution Value that calculates interfering energy, method is as follows:
P r′=PT′-PL (3)
In formula (3),
Figure BDA0000453748140000111
p r' the interfering energy that can receive for each coordinate points, P tfor the transmitting power of interference source, PL sthe loss causing for shadow effect,
Figure BDA0000453748140000112
for free space path loss, preferably, free space path loss adopts HATA model,
PL ( f , d ) &OverBar; ( dB ) = 69.55 + 26.16 log f c - 13.82 log h te - a ( h re ) + ( 44.9 - 6.55 log h te ) log d
From three formula above, received power P r' with P t, f c, h te, h re, d is relevant.
At same launch point, same receiving station, transmitting power is identical but in situation that operating frequency is different, the difference of received power is:
&Delta;P r &prime; = P r f 1 - P r f 2 = P t f 1 - PL f 1 - ( P t f 2 - PL f 2 )
Because
Figure BDA0000453748140000115
so
&Delta;P r &prime; = - PL f 1 - ( - PL f 2 ) = PL f 2 - PL f 1 = PL f 2 ( f , d ) &OverBar; + PL s f 2 - ( PL f 1 ( f , d ) &OverBar; + PL s f 1 )
Due to for same MU and same SU,
Figure BDA0000453748140000117
h te, h re, d all equate, so
ΔP r′=26.16[log(f 1/f 2)]-[a 1(h re)-a 2(h re)]
In HATA model, for the urban environment of different scales, a (h re) difference.For big city, portable antenna modifying factor is:
a(h re)=8.29(log1.54h re) 2-1.1dB f c≤300MHz
a(h re)=3.2(log11.75h re) 2-4.97dB f c≥300MHz
For small and medium-sized cities, for:
a(h re)=(1.1logf c-0.7)h re-(1.56logf c-0.8)dB
As the above analysis, for same launch point, at the identical but operating frequency f of the power of twice emitting signal cin different situations, the difference DELTA P of the received power of same SU ronly with the centre frequency f of these two channels crelevant.So ε is set as
ε=26.16[log(f 1/f 2)]-[a 1(h re)-a 2(h re)]+x n
2, draw and disturb situation map
The calculated value being distributed by the interfering energy obtained, adds error correction values, can draw out investigate in region, embody that interfering energy distributes disturb comparatively really situation map.
Cognitive user of the present invention is by perception radio environment around, whether detect in channel has the interfering energy of malicious user and estimation malicious user to distribute, further set up and disturb situation map, by primary user's energy and malicious user energy separation, both can show that only embodying malicious user interfering energy distributes, and can combine with frequency spectrum cavity-pocket detection means and draw frequency spectrum situation map accurately again.
Disturb situation map as shown in Figure 7, Figure 8, the color of figure coil is shallow by being deep to, and the interference power that expression trust time user receives from large to small.Black shows the interfering energy maximum that SU receives herein, as A, B, C tri-places (this three place also just the position at malicious user place); Along with color shoals gradually, the interfering energy that SU can receive also diminishes gradually, and the white space as shown in the lower left corner in figure shows to be disturbed hardly herein.Interference power in figure reaches as high as 20dB, minimum only have-15dB, if the interference power in somewhere is less than the signal-noise ratio threshold of receiver, in the situation that knowing this channel by bogus attack, we still can use this channel so; If but interference power is greater than the signal-noise ratio threshold of receiver herein, be just not suitable for using this channel.
Wherein, Fig. 7 is the interfering energy distribution situation of the malicious user of reality in T cycle, channel i, and Fig. 8 adopts this method to estimate the interfering energy distribution situation of the malicious user in T cycle, the channel i of gained.Comparison diagram 7 and Fig. 8 are known, and the coordinate in Fig. 7 and the region that in Fig. 8, lines shade is identical is also approximate identical, and this illustrates the identical interference power of size in two figure, and the position of its distribution is approximate identical, and this method can estimate more exactly interfering energy and distribute.Bunch malicious user interfering energy distribution map that head draws according to this programme carrys out the allocated channel to SU, and the probability of success that can make to communicate by letter improves greatly, has improved communications security.
To considering, disturb situation and do not consider to disturb the channel capacity of situation to analyze respectively below:
Definition 1: power system capacity is to investigate the summation of each channel average size in region.If being each trust time user, the average size of each channel accesses the mean value of the channel capacity that this primary user's channel can obtain.According to shannon formula, if the maximum channel capacity that the inferior user's access of each trust primary user channel can obtain is:
C ( N i ) = B log ( 1 + S N 0 + N i ) - - - ( 4 )
Wherein, B is channel width, and S is for trusting time user emission power, N ifor trusting time user, to the received power of malicious user, be interference power, N 0for other noise jamming on channel.
From formula (4), the capacity of i the cognitive user based on disturbing situation map is
C ( N i ) = B log ( 1 + S / N 0 ) , B log [ 1 + S / ( N i + N 0 ) ] , - - - ( 5 )
And the capacity of not considering i cognitive user disturbing situation is
C ( N i ) = B log ( 1 + S / N 0 ) , 0 , - - - ( 6 )
From formula (5) and formula (6), contrasted the capacity difference when channel capacity difference in two kinds of situations is bogus attack.Because the latter does not consider the situation of attacking, when having bogus attack, the latter can think it is that primary user uses and abandons the right of eminent domain to this channel by mistake, so its channel capacity is 0.
Define the capacity C of 2: the i channels iaverage for the capacity of time user of each trust in system to this channel.Power system capacity C sthe capacity sum of each channel, for
C S = &Sigma; i = 1 L C i = &Sigma; i = 1 L &Sigma; j = 1 N C ( N j ) - - - ( 7 )
For whole system, the channel capacity while considering to disturb the frequency spectrum situation map of situation will obtain much attacking, and then improved the capacity of system.When the malicious user in system only has one, the power system capacity difference under two kinds of methods is Δ C s=Blog[1+S/(N i+ N 0)], when having m malicious user, the capacity difference Δ C of system s=mBlog[1+S/(N i+ N 0)], so when malicious user is more, power system capacity difference is larger.But this trend is along with malicious user number reduces more than the number of channel.Because when malicious user number equals after the number of channel, MU of every increase, N icontinue to become large, by the C (N of formula (5) gained i) continue to reduce, its power system capacity also continues to reduce, and that is to say, and 1 MU attacks a channel or the capacity of 2 attack same channel formula (5) gained are different; Concerning formula (6), do not have this difference, so equal after the number of channel when MU number, its capacity loss trend obviously slows down.
Figure 9 shows that the power system capacity of the present invention under many malicious users of multichannel environment, its power system capacity is higher than the power system capacity of cognition network in the method for ZHANG.
The present invention has carried out further detailed description for execution mode or embodiment to the object, technical solutions and advantages of the present invention; institute is understood that; above lifted execution mode or embodiment are only the preferred embodiment of the present invention; not in order to limit the present invention; all any modifications made for the present invention within the spirit and principles in the present invention, be equal to replacement, improvement etc., within protection scope of the present invention all should be included in.

Claims (9)

1. the interference estimation method of cognitive radio networks based on simulated main customer attack, it is characterized in that: comprising: trust time user's receive channel power, utilize any one channel in channel power detection cognitive radio networks whether occupied, channel occupancy state and channel power are sent to a bunch head; Bunch head judges whether occupied channel is attacked; Estimation is distributed by the interfering energy of attack channel.
2. the interference estimation method of cognitive radio networks based on simulated main customer attack according to claim 1, it is characterized in that: whether described to utilize channel power to detect any one channel in cognitive radio networks occupied, comprising: if there is P on this channel rk-T m< σ, determines that this channel is that doubtful primary user takies, wherein T mfor interference threshold, P rkbe k channel power of trusting the channel r that time user receives.
3. the interference estimation method of cognitive radio networks based on simulated main customer attack according to claim 1, is characterized in that: described bunch of head judges that whether occupied channel is attacked, and comprising:
The channel occupancy situation of each user's judgement that bunch head sends according to each user judges whether this channel takies;
Bunch head obtains the number of the information source of occupied channel, according to the number of described information source, judges whether this channel is attacked.
4. the interference estimation method of cognitive radio networks based on simulated main customer attack according to claim 3, it is characterized in that: the channel occupancy situation that each user that described bunch of head sends according to each user judges judges whether this channel takies and comprises: if there is user to think that channel is that doubtful primary user takies, think that this channel is occupied, if all users think that channel is unoccupied, channel is idle condition.
5. the interference estimation method of cognitive radio networks based on simulated main customer attack according to claim 3, is characterized in that: the number that described bunch of head obtains the information source of occupied channel adopts Gerschgorin radii method.
6. the interference estimation method of cognitive radio networks based on simulated main customer attack according to claim 3, it is characterized in that: the described number according to described information source judges whether this channel is to be comprised by attacking: if number n >=2 of information source, this channel is in counterfeit main customer attack.
7. the interference estimation method of cognitive radio networks based on simulated main customer attack according to claim 3, is characterized in that: the described number according to described information source judges whether this channel is to be comprised by attacking: if the number n=1 of information source:
(1) first judge that whether this channel is in occupied state, if Δ P r'≤ε, this channel is occupied state; Wherein,
&Delta;P r &prime; = P r T 1 - P r T 2 = 26.16 [ log ( f 1 / f 2 ) ] - [ a 1 ( h re ) - a 2 ( h re ) ] , ε=26.16[log (f 1/ f 2)]-[a 1(h re)-a 2(h re)]+x n, for period T 1at certain location point, to centre frequency, be f 1channel received power,
Figure FDA0000453748130000023
for period T 2at same position point, to centre frequency, be f 2channel received power, a 1(h re), a 2(h re) be portable antenna modifying factor, x nfor average system noise;
(2) judge whether this channel exists malicious interference user, if Δ P< is ε, there is malicious interference user in this channel again; Wherein,
&Delta;P = ( | P 1 , T 1 f D 1 - P 1 , T 1 - 1 f i | + | P 2 , T 1 f D 1 - P 2 , T 1 - 1 f i | + . . . + | P k , T 1 f D 1 - P k , T 1 - 1 f i | + . . . + | P M , T 1 f D 1 - P M , T 1 - 1 f i | ) / M , F i∈ D-f d1, D is the set of all channels in working frequency range,
Figure FDA0000453748130000025
be k and trust time user at T 1individual sense cycle is interior to channel f d1energy sensing value, M refers to and trusts time user's number.
8. the interference estimation method of cognitive radio networks based on simulated main customer attack according to claim 1, is characterized in that: described estimation is distributed and comprises coordinate and the transmitting power of estimating this channel malicious user by the interfering energy of attack channel, specifically comprises:
303-1A, estimate the Bo Dajiao of each information source at array antenna 1 place
Figure FDA0000453748130000026
bo Dajiao with array antenna 2 places
Figure FDA0000453748130000027
303-1B, according to information source i, at the ripple at array antenna 1 and 2 places, reach angle θ iand θ ' iand the coordinate (a of array antenna 1,2 1, b 1), (a 2, b 2), obtain the equation y of this malice information source place straight line i=tan θ i(x i-a 1)+b 1and y i=tan θ ' i(x i-a 1)+b 1;
303-1C, according to the equation of malice information source place straight line, obtain s the intersection point that comprises malice information source coordinate, the coordinate of definite malicious user from s intersection point, determines the transmitting power of malicious user.
9. the interference estimation method of cognitive radio networks based on simulated main customer attack according to claim 8, it is characterized in that: interfering energy is distributed and revised, comprise: multiple transducers are evenly set, the received power error amount of calculating sensor position, error amount is adopted to interpolation method, calculate the error correction values between adjacent sensors position, the transmitting power of described channel malicious user coordinate is revised.
CN201410005815.9A 2014-01-06 2014-01-06 Cognitive radio networks interference estimation method based on simulated main customer attack Active CN103746756B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410005815.9A CN103746756B (en) 2014-01-06 2014-01-06 Cognitive radio networks interference estimation method based on simulated main customer attack

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410005815.9A CN103746756B (en) 2014-01-06 2014-01-06 Cognitive radio networks interference estimation method based on simulated main customer attack

Publications (2)

Publication Number Publication Date
CN103746756A true CN103746756A (en) 2014-04-23
CN103746756B CN103746756B (en) 2016-08-31

Family

ID=50503752

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410005815.9A Active CN103746756B (en) 2014-01-06 2014-01-06 Cognitive radio networks interference estimation method based on simulated main customer attack

Country Status (1)

Country Link
CN (1) CN103746756B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105554739A (en) * 2015-12-08 2016-05-04 浙江大学 Primary user emulation attack detection method based on channel multipath delay differences
CN105979590A (en) * 2016-04-27 2016-09-28 西安交通大学 User scheduling and power distribution method based on effective capacity in cognitive radio system
CN106028290A (en) * 2016-05-06 2016-10-12 浙江工业大学 WSN multidimensional vector fingerprint positioning method based on Kriging
CN106714336A (en) * 2016-10-25 2017-05-24 南京邮电大学 Wireless sensor network temperature monitoring method based on improved Kriging algorithm
CN107086921A (en) * 2017-04-18 2017-08-22 桂林电子科技大学 A kind of method for identifying ID based on cell spectrum auction system
CN107483413A (en) * 2017-07-25 2017-12-15 西安电子科技大学 Two-way intruding detection system and method based on cloud computing, cognitive radio networks
CN108174379A (en) * 2018-02-09 2018-06-15 东南大学 The malicious user recognition methods screened based on support vector machines and threshold value and device
CN108683642A (en) * 2018-04-25 2018-10-19 长沙学院 The detector and detection method of intelligent grid line status wrong data injection attacks
CN113692012A (en) * 2021-07-14 2021-11-23 成都长城开发科技有限公司 Wireless noise detection system, method, device, electronic device, and storage medium

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1933665A (en) * 2006-10-12 2007-03-21 重庆邮电大学 Mobile communication system user certification method

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1933665A (en) * 2006-10-12 2007-03-21 重庆邮电大学 Mobile communication system user certification method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
李方伟、冯德俊、朱江: "一种基于PUE恶意干扰的认知无线电态势感知方案", 《电信科学》, 20 December 2013 (2013-12-20), pages 21 - 27 *
逄德明、胡罡、徐明: "基于能量指纹匹配的无线认知网络仿冒主用户攻击检测", 《计算机科学》, 15 March 2011 (2011-03-15), pages 28 - 33 *

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105554739B (en) * 2015-12-08 2018-09-28 浙江大学 Primary user based on channel multi-path delay inequality emulates attack detection method
CN105554739A (en) * 2015-12-08 2016-05-04 浙江大学 Primary user emulation attack detection method based on channel multipath delay differences
CN105979590A (en) * 2016-04-27 2016-09-28 西安交通大学 User scheduling and power distribution method based on effective capacity in cognitive radio system
CN105979590B (en) * 2016-04-27 2019-04-16 西安交通大学 User's scheduling and power distribution method in cognitive radio system based on available capacity
CN106028290A (en) * 2016-05-06 2016-10-12 浙江工业大学 WSN multidimensional vector fingerprint positioning method based on Kriging
CN106714336A (en) * 2016-10-25 2017-05-24 南京邮电大学 Wireless sensor network temperature monitoring method based on improved Kriging algorithm
CN106714336B (en) * 2016-10-25 2020-02-21 南京邮电大学 Wireless sensor network temperature monitoring method based on improved kriging algorithm
CN107086921A (en) * 2017-04-18 2017-08-22 桂林电子科技大学 A kind of method for identifying ID based on cell spectrum auction system
CN107086921B (en) * 2017-04-18 2020-04-24 桂林电子科技大学 User identity identification method based on small cell spectrum auction system
CN107483413A (en) * 2017-07-25 2017-12-15 西安电子科技大学 Two-way intruding detection system and method based on cloud computing, cognitive radio networks
CN107483413B (en) * 2017-07-25 2021-01-19 西安电子科技大学 Bidirectional intrusion detection method and system based on cloud computing
CN108174379A (en) * 2018-02-09 2018-06-15 东南大学 The malicious user recognition methods screened based on support vector machines and threshold value and device
CN108683642A (en) * 2018-04-25 2018-10-19 长沙学院 The detector and detection method of intelligent grid line status wrong data injection attacks
CN113692012A (en) * 2021-07-14 2021-11-23 成都长城开发科技有限公司 Wireless noise detection system, method, device, electronic device, and storage medium
CN113692012B (en) * 2021-07-14 2024-05-14 成都长城开发科技股份有限公司 Wireless noise detection system, method, device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN103746756B (en) 2016-08-31

Similar Documents

Publication Publication Date Title
CN103746756A (en) Primary user emulation attack-based interference estimation method for cognitive radio network
Shu et al. On physical layer security for cognitive radio networks
CN101309151B (en) Safe positioning method for wireless sensor
Bouassida et al. Sybil Nodes Detection Based on Received Signal Strength Variations within VANET.
He et al. Is link signature dependable for wireless security?
CN102324959B (en) Frequency spectrum sensing method based on multi-aerial system covariance matrix
CN106160819B (en) A kind of signaling method and equipment
CN103220052A (en) Method for detecting frequency spectrum hole in cognitive radio
Zhang et al. Achieving bilateral utility maximization and location privacy preservation in database-driven cognitive radio networks
CN102595411B (en) Sensor-based method for detecting various attacks in cognitive radio network
CN107623554A (en) A kind of cooperative frequency spectrum sensing method based on trust value, cognition wireless network
CN106161297A (en) In ofdm system, anti-pilot tone spoofing attack channel based on independent component analysis is estimated and recognition methods
CN107426212B (en) Agent-based intrusion detection method in cognitive wireless network
Wang et al. Efficient identity spoofing attack detection for IoT in mm-wave and massive MIMO 5G communication
CN101494508A (en) Frequency spectrum detection method based on characteristic cyclic frequency
Misra et al. Detection of identity-based attacks in wireless sensor networks using signalprints
CN104202106B (en) Based on the cooperative frequency spectrum sensing method of degree of belief in mobile context
Zhao et al. Optimisation of multi‐channel cooperative sensing in cognitive radio networks
Liu Mac spoofing attack detection based on physical layer characteristics in wireless networks
CN103916859B (en) The detection method of cognition wireless network malice busy channel user
CN114879195A (en) Unmanned aerial vehicle cluster radar communication integration method based on resource scheduling
CN105307185B (en) A kind of gunz cooperation spectrum sensing method based on data purification
Peng et al. Analysis and simulation of sensing deception in fading cognitive radio networks
CN105743594B (en) Primary user&#39;s bogus attack detection method based on cooperation among users in a kind of cognitive radio system
CN106972900A (en) Based on broad sense T2The blind frequency spectrum sensing method of statistic

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant