CN103746756B - Cognitive radio networks interference estimation method based on simulated main customer attack - Google Patents
Cognitive radio networks interference estimation method based on simulated main customer attack Download PDFInfo
- Publication number
- CN103746756B CN103746756B CN201410005815.9A CN201410005815A CN103746756B CN 103746756 B CN103746756 B CN 103746756B CN 201410005815 A CN201410005815 A CN 201410005815A CN 103746756 B CN103746756 B CN 103746756B
- Authority
- CN
- China
- Prior art keywords
- channel
- user
- occupied
- malicious
- interference
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 50
- 230000001149 cognitive effect Effects 0.000 title claims abstract description 49
- 238000001514 detection method Methods 0.000 claims abstract description 16
- 241000854291 Dianthus carthusianorum Species 0.000 claims description 34
- 238000012937 correction Methods 0.000 claims description 13
- 230000005540 biological transmission Effects 0.000 claims description 8
- 238000011835 investigation Methods 0.000 claims description 6
- 238000001228 spectrum Methods 0.000 abstract description 23
- 238000005516 engineering process Methods 0.000 abstract description 4
- 230000002452 interceptive effect Effects 0.000 abstract 3
- 230000008447 perception Effects 0.000 abstract 1
- 238000000926 separation method Methods 0.000 abstract 1
- 238000004422 calculation algorithm Methods 0.000 description 9
- 238000010586 diagram Methods 0.000 description 6
- 238000004364 calculation method Methods 0.000 description 4
- 238000004891 communication Methods 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 238000011160 research Methods 0.000 description 4
- 238000005562 fading Methods 0.000 description 3
- 238000012360 testing method Methods 0.000 description 3
- 150000001875 compounds Chemical class 0.000 description 2
- 230000003247 decreasing effect Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000004088 simulation Methods 0.000 description 2
- 201000000297 Erysipelas Diseases 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 239000003086 colorant Substances 0.000 description 1
- 230000010485 coping Effects 0.000 description 1
- 238000000354 decomposition reaction Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 239000011541 reaction mixture Substances 0.000 description 1
- 230000000717 retained effect Effects 0.000 description 1
- 238000011895 specific detection Methods 0.000 description 1
- 230000003595 spectral effect Effects 0.000 description 1
- 238000012706 support-vector machine Methods 0.000 description 1
- 238000012549 training Methods 0.000 description 1
- 239000013598 vector Substances 0.000 description 1
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The present invention relates to cognitive radio frequency spectrum management and security technology area, particularly to cognitive radio networks interference estimation method based on simulated main customer attack, including: trust time user and receive channel power, utilize any one channel in channel power detection cognitive radio networks the most occupied, channel occupation status and channel power are sent to a bunch head;Bunch head judges that whether occupied channel is for being hacked;Estimate to be hacked the interfering energy distribution of channel;Cognitive user of the present invention is by the radio environment around perception, detect and whether channel has malicious user and estimates the interfering energy distribution of malicious user, set up interference situation map further, by primary user's energy and malicious user energy separation, both can draw and only embody the distribution of malicious user interfering energy, and can combine with frequency spectrum cavity-pocket detection means again and draw frequency spectrum situation map accurately.
Description
Technical Field
The invention relates to the technical field of cognitive radio spectrum management and safety, in particular to an interference estimation method for a cognitive radio network based on imitation of master user attack, which constructs the interference situation of a malicious user by identifying an information source identity and estimating interference energy.
Background
With the development of scientific technology, spectrum resources are increasingly tense, but in the current spectrum management mode, even if an authorized User (also called a Primary User, PU for short) does not use an authorized frequency band, an unauthorized User (also called a trusted Secondary User, SU for short) cannot use the frequency band, and the utilization rate of the spectrum is greatly reduced under the condition. In order to solve the contradiction, a Cognitive Radio (CR) technology is proposed, in which an unauthorized user senses an idle frequency band through a spectrum sensing algorithm, and makes full use of spectrum resources on the premise of not affecting communication of the authorized user. All the trusted users mentioned in the method are trusted users, namely all data sent to the cluster head by the trusted users are real data or calculated according to the real data, and are not subjected to any malicious modification.
However, some new security issues are also introduced during spectrum access. Such as: the method comprises the following steps of imitating a Primary User Emulation Attack (PUEA for short), namely sending a signal imitating a Primary User signal by a Malicious User (MU for short), misleading a secondary User to believe that the Primary User is sending the signal, and judging that a channel is occupied by the Primary User and cannot use the channel.
At present, research aiming at PUEA mainly focuses on how a single trust secondary user detects attacks, and the influence of the attacks is not analyzed from a large-scale angle, and a corresponding coping scheme is made. For example, for the counterfeit main user attack, the anti-attack research proposed in the existing literature is to add some matching algorithms, such as HASH function, main user energy fingerprint, etc., at the transmitting and receiving ends to avoid the counterfeit attack from affecting the trust of the secondary user to correctly judge whether the channel is idle. The methods basically guarantee the dominance of all idle channels, but for the channel with malicious users, if the channel distribution center distributes the interference situation to the trust secondary users indiscriminately, the trust secondary users in the interference range still cannot use the channel safely due to excessive interference even if the trust secondary users obtain the channel, and therefore the safety of the cognitive network communication is reduced.
On one hand, when the condition of detecting whether the attack exists is researched, the research on the distribution situation of the attack energy is also significant to spectrum sensing safety. On the other hand, how to systematically and reliably excavate available spectrum holes in a network is one of the keys for realizing the cognitive radio technology, a spectrum situation graph refers to a 'spectrum map' which vividly and intuitively presents the spectrum holes in the cognitive radio, and the existing documents research the spectrum situation graph without attacks, so that when the attacks of a simulated main user exist, the situation graph can not distinguish the energy of the main user and the energy of a malicious user, the system loses the domination on the channel imitating the attacks, and the system capacity is reduced.
Disclosure of Invention
In order to solve the technical problems, the invention provides an interference estimation method of a cognitive radio network based on imitation of master user attack.
The invention discloses an interference estimation method of a cognitive radio network based on imitation of master user attack, which comprises the following steps: trusting the secondary user to receive the channel power, utilize the channel power to detect whether any channel in the cognitive radio network is occupied, will channel occupation state and channel power send to the cluster head; the cluster head judges whether the occupied channel is attacked or not; the interference energy distribution of the attacked channel is estimated.
Preferably, the detecting whether any channel in the cognitive radio network is occupied by using the channel power includes: if P exists on the channelrk-Tm<Sigma, determining the channel as a suspected main user occupation, wherein TmAs interference threshold, PrkThe channel power of channel r received for the kth trusted secondary user.
Preferably, the determining, by the cluster head, whether the occupied channel is attacked includes:
the cluster head judges whether the channel is occupied according to the channel occupation condition judged by each user and sent by each user;
and the cluster head acquires the number of the information sources of the occupied channel and judges whether the channel is attacked or not according to the number of the information sources.
Preferably, the determining, by the cluster head, whether the channel is occupied according to the channel occupation status determined by each user sent by each user includes: and if any user considers that the channel is occupied by a suspected main user, the channel is considered to be occupied, and if all users consider that the channel is not occupied, the channel is in an idle state.
Preferably, the number of the information sources of the occupied channel acquired by the cluster head adopts a Gauss circle radius method.
Preferably, the determining whether the channel is attacked according to the number of the information sources includes: if the number n of the information sources is more than or equal to 2, the channel is in the attack of the counterfeit master user.
Preferably, the determining whether the channel is attacked according to the number of the information sources includes: if the number n =1 of the sources:
(1) firstly, determining whether the channel is in an occupied state, if Δ PrIf' is less than or equal to the preset threshold, the channel is in an occupied state;
in the formula, the compound is shown in the specification, =26.16[log(f1/f2)]-[a1(hre)-a2(hre)]+xnwherein:is a period T1At a certain point pair with center frequency f1The received power of the channel of (a),is a period T2At the same position point pair with center frequency f2Channel received power of a1(hre)、a2(hre) For shifting the antenna correction factor, xnIs the average system noise;
(2) judging whether the channel has malicious interference users, if so, judging that the channel has the malicious interference users;
in the formula, the compound is shown in the specification,
Preferably, the estimating of the interference energy distribution of the attacked channel includes estimating coordinates and transmission power of a malicious user of the channel, and specifically includes:
303-1A, estimating the angle of arrival of each source at the array antenna 1And the angle of arrival at the array antenna 2
303-1B, angle of arrival theta at array antennas 1 and 2 according to source iiAnd θ'iAnd the coordinates (a) of the array antennas 1,21,b1)、(a2,b2) Solving the equation y of the line where the malicious information source is locatedi=tanθi(xi-a1)+b1And yi=tanθ′i(xi-a1)+b1;
303-1C, solving s intersection points containing the coordinates of the malicious information source according to the equation of the straight line where the malicious information source is located, determining the coordinates of the malicious user from the s intersection points, and determining the transmitting power of the malicious user.
Preferably, the modifying the interference energy distribution comprises: uniformly distributing a plurality of sensors in an investigation area, calculating a receiving power error value at the position of the sensor, calculating an error correction value between adjacent sensor positions by adopting an interpolation method for the error value, and correcting the transmitting power at the coordinate of the channel malicious user.
According to the method, the cognitive user senses the surrounding radio environment to detect whether the malicious user exists in the channel or not and estimate the interference energy distribution of the malicious user, an interference situation graph is further established, the energy of the main user is separated from the energy of the malicious user, the interference energy distribution of the malicious user can be reflected, and an accurate spectrum situation graph can be obtained by combining with a spectrum cavity detection means.
Drawings
FIG. 1 is a diagram of a prior art network model;
FIG. 2 is a schematic flow chart of a first preferred embodiment of the interference estimation method based on imitating the attack of a master user in the cognitive radio network;
FIG. 3 is a flowchart illustrating a detailed implementation of step 301 of the interference estimation method for a cognitive radio network based on a master user attack simulation according to the present invention;
FIG. 4 is a flowchart illustrating a detailed implementation of step 302 of the interference estimation method for a cognitive radio network based on a simulated master user attack according to the present invention;
FIG. 5 is a flowchart illustrating a detailed implementation of step 303 of the interference estimation method based on imitating the attack of the master user in the cognitive radio network according to the preferred embodiment of the present invention;
FIG. 6 is a schematic flow chart of a second preferred embodiment of the interference estimation method based on imitating the attack of a master user in the cognitive radio network of the present invention;
FIG. 7 is an interference situation diagram obtained by the cognitive radio network of the present invention based on an interference estimation method that mimics the attack of a primary user;
FIG. 8 is a graph of interference situation obtained using the prior art;
FIG. 9 is a simulation diagram comparing the system capacity of the cognitive radio network based on the interference estimation method imitating the attack of the master user and the prior art.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Assume that the investigation region is a cognitive radio network composed of L primary users (each primary user occupies 1 channel), M trusted secondary users, N malicious users, and a pair of array antennas, as shown in fig. 1. The cognitive network adopts a cooperative spectrum sensing model, namely trust secondary users in a certain area are automatically combined into a cluster, and a cluster head is elected through an election algorithm. And each SU sends the detected energy value to the cluster head, and the cluster head performs unified processing. Generally, a primary user in the network is mobile, and a secondary user can freely join or leave the cognitive network under trust, but cannot move in the detection process.
The interference estimation method of the cognitive radio network based on imitating the attack of the master user, as shown in figure 2, comprises the following steps:
step 301, trusting a secondary user to receive channel power, detecting whether any channel in a cognitive radio network is occupied by using the channel power, and sending a channel occupation state and the channel power to a cluster head;
step 302, judging whether the occupied channel is attacked or not by the cluster head;
step 303, estimating the interference energy distribution in the attacked channel.
Embodiments of the various steps of the present invention are described below.
The step 301 of trusting the secondary user to receive the channel power, detecting whether any one channel in the cognitive radio network is occupied by using the channel power, and sending the channel occupation state and the channel power to the cluster head, as shown in fig. 3, includes:
301-1 for the ith channel (denoted f) in the networki) Each trusted secondary user SUkReceiving the channel power PrkJudging whether the channel is occupied by a suspected master user;
suppose a kth trusted secondary user SUkIs denoted as PrkIf channel fiIn presence of Prk≥TmThen determine the messageThe lane is occupied by a suspected main user and marked as fDiOtherwise, the channel is determined to be unoccupied. Wherein, TmFor the interference threshold, the value of which is different according to the modulation systems accepted by different cognitive users, the detailed setting method thereof is preferably as follows: li yanlin, corning, cunning, senior vitae, erysipelas, extended discussion of frequency point thresholds in cognitive radio systems, proceedings of electrical wave science, 2010, 25 (9): 169-171
301-2, will receive power PrkAnd the channel occupation condition judged by the user is sent to the cluster head.
Whether SUkIf the suspected master user occupation is detected, the receiving power P is requiredrkAnd sending the data to the cluster head.
The step 302 of judging whether the occupied channel is attacked by the cluster head specifically includes the following steps:
the cluster is a set formed by freely combining users in a certain region range, and the cluster head is a user arbitrarily selected from the cluster; the clusters and cluster heads are common concepts in the art and will not be described further. As shown in fig. 4, the method specifically includes:
302-1, judging whether the channel is occupied or not by the cluster head according to the channel occupation condition judged by each user sent by each user;
according to the principle that a master user in cognitive radio preferentially uses an authorized channel, judging whether the channel is occupied or not after a cluster head obtains the channel occupation condition judged by each user sent by each user in the cluster;
that is, if some users consider that the channel is occupied by a suspected primary user, the channel is considered to be occupied, and if all the users consider that the channel is not occupied, the channel is in an idle state. If the channel is idle, the process returns to step 301 to detect additional channels.
302-2, the cluster head acquires the number of the information sources of the occupied channel, and judges whether the channel is attacked or not according to the number of the information sources;
302-2A, the number of the information sources of the occupied channel acquired by the cluster head
As an implementation manner, the cluster head determines a channel f occupied by a suspected primary userDiAnd the number n of the medium information sources is used for judging the number of the information sources of a certain channel according to the reporting condition of each trust secondary user.
As another preferred embodiment, the cluster head determines a channel f occupied by a suspected primary userDiEstimating the channel f occupied by the suspected main user by adopting a Geiger circle radius method according to the number n of the medium information sourcesDiNumber n of intermediate sources
The Geiger circle radius method is referred to Chengmuio, left Jingkun, Lidong, etc. Power System harmonic detection based on Geiger circle and TAM [ J ]. Nature science, edition, 2012,38(005): 612-.
302-2B, judging whether the channel is attacked or not according to the number of the information sources
If the number n of the information sources is larger than or equal to 2, the channel is under the attack of counterfeit master users, and because two master users cannot exist in one channel at the same time, the process directly enters the step 303.
If the number n =1 of the information sources, only one user is in the channel, and whether the user is a master user or a malicious user cannot be determined, and the process enters 302-2C.
For judging whether the channel is occupied by the malicious user, the embodiment of the invention provides two ways, which are respectively as described in the following 302-2C and 302-2D, and both can judge whether the channel is occupied by the malicious user.
As an implementation manner, the determining whether the channel is occupied by a malicious user includes:
302-2C, judging whether the channel is occupied by a malicious user or not
(1) Firstly, whether the channel is in an occupied state or not is judged
Due to malicious usersThe position and the transmission power are generally fixed, so that in any two periods T1And T2The difference in received power of the signals transmitted on two different channels at the same location being frequency dependent, i.e. the difference is only
Wherein, a1(hre)、a2(hre) For shifting the antenna correction factor, f1、f2Is the center frequency of the two channels.
Then, if each SU is detected at T, it can be obtained from equation (1)1Period to channel fD1Received power ofAnd at T1-1 period pair channel fD2Received power ofDifference value Δ P ofr' < 2 >, the channel f is indicatedD1Is in an occupied state. Wherein, =26.16[ log (f)1/f2)]-[a1(hre)-a2(hre)]+xn,xnIs the average system noise.
(2) If the channel is in the occupied state, judging whether the channel has malicious interference users.
The specific detection algorithm is as follows:
calculating the current detection period T1In fD1Upper received power and last period T1-1 mean value of the difference of the received power of the detection point at all other channels:
in the formula (2), fi∈D-fD1D is the set of all channels in the working frequency band,for the kth trusted secondary user at the Tth1For channel f in one detection periodD1M refers to the number of trusted secondary users.
If Δ P is not less than fD1The main user is different from other channels, and the channel has no malicious counterfeit user and continues to detect the next channel; if Δ P<Then explain fD1Coincides with the energy fingerprint of a certain channel, indicating that f is nowD1There is malicious user occupancy in the channel, where =26.16[ log (f)1/f2)]-[a1(hre)-a2(hre)]+xn,xnIs the average system noise.
As another implementation, the determining whether the channel is occupied by a malicious user includes:
and the receiver of the 302-2D cognitive user receives a signal similar to that sent by an authorized main user, and starts a PUE attack detection system. In an observed time window, a power spectral density calculation is firstly carried out on a time domain sample of a physical layer to obtain a frequency domain sample, and then wavelet decomposition is carried out. Since the variation of fading channel characteristics is generally concentrated in a low frequency band, a low frequency part (an approximation part) is selected when the original signal is reconstructed at a specific scale, and the correlation is enhanced. Corresponding features of the isolated signal are then extracted and detected using a trained support vector machine for training vectors. If the detection result is fD1Malicious user occupation exists in a channel, which is specifically referred to as: detection of simulated spoofing attacks by authorized users in cognitive radioMethod [ J]China military convertant, 2012,6: 015.
And when the malicious user is detected to occupy, determining the channel as attacked.
As an implementation manner, the step 303 of estimating the interference energy distribution in the attacked channel, specifically as shown in fig. 5, includes the following steps:
303-1, estimating the coordinates and transmitting power of the channel malicious user
303-1A, estimating the angle of arrival of each source at the array antenna 1And the angle of arrival at the array antenna 2
The estimation of the angle of arrival may employ the MUSIC algorithm, which is described in the following references: wangyongliang, chenhui, penning, ten thousand groups, space spectrum estimation theory and algorithm [ M ]. beijing, qinghua university press, 2013. The angle of arrival estimation may also be performed in another way, as described in the following references: yan stiffness, Jinming, John, applied to transform domain two-dimensional angle of arrival fast estimation algorithm [ J ] for arbitrary arrays, academic newspaper, 2013.
303-1B, angle of arrival theta at array antennas 1 and 2 according to source iiAnd θ'iAnd the coordinates (a) of the array antennas 1,21,b1)、(a2,b2) Solving the equation y of the line where the malicious information source is locatedi=tanθi(xi-a1)+b1And yi=tanθ′i(xi-a1)+b1。
303-1C, solving s intersection points containing the coordinates of the malicious information source according to the equation of the straight line where the malicious information source is located, determining the coordinates of the malicious user from the s intersection points, and determining the transmitting power of the malicious user;
and (3) s-n coordinates which are not the source are selected from the s intersection points containing the malicious source coordinates, and the coordinates of the malicious user are selected according to the Dirichlet principle and the hypothesis testing algorithm.
Dirichlet principle: putting m articles into n (n) in any mode<m) drawers, at least one drawer is provided with two or more articles. The application of the invention is as follows: the correct intersection combination contains n-n or less1+1 points of intersection on the line of array antenna l, or combinations thereof of no more than n-n2The +1 intersections are on the direction finding line of the array antenna 2.
Step 302 has found that the number of malicious users in the channel is n, and we divide the s intersections into n groups of combinations, which have the same structureAnd (4) combination. The 1 st group of intersection combinations are detected as follows: from step (21), it is known that the array antenna 1 has n1A line of direction finding, n1N is less than or equal to n; if the number of collinear intersections in the combination is more than n-n1+1, the dirichlet principle is not met, so the combination is excluded. If group 1 is combined with n of array antenna 11The strip line of direction-finding conforms to the Dirichlet principle, again with n for the array antenna 22In the case of a lateral line (n)2N) or less), whether the number of collinear intersections in the combination is greater than n-n2And +1, if the number is larger than the preset value, the Dirichlet principle is not satisfied, and the combination is excluded. If so, the combination is retained and a hypothesis test is waited.
For the restAnd performing the same detection on the group combinations, assuming that C combinations are left after the detection, and assuming that each intersection point in the left combinations is the position of the MU, performing hypothesis test on the C combinations:
(1) for the 1 st combination, selecting the received power P of n SUs received by the cluster headr1,Pr2,...,PrnAccording toCalculating emission power PT 'of n malicious users'1,PT′2,...,PT′nAnd according to PT'1,PT′2,...,PT′nCalculating received power P 'of additional L-n SU'r1,P′r2,...,P′r(L-n)And is prepared from P'rkWith the power P received by the kth SUrkSubtract (i =1, 2.., L-n) to yield the 1 st Δ P'r,
(2) The same calculation was carried out for the remaining C-1 combinations to give a plurality of different combinations of Δ P'rAnd preferably 10.
(3) Is delta P'rThe smallest of those combined coordinates is determined as the malicious user coordinates.
(4) Is delta P'rMinimum group PT'1,PT′2,...,PT′nAnd determining the transmission power of the n malicious users.
Preferably, in order to reduce the calculation error, the n malicious users SU calculating the transmission power PT' of the malicious user have to select SUs closer to the malicious user MU node that needs to be calculated. Since the cluster head knows the location of each SU, and also the location of each group of MU nodes, the n SUs are chosen by the cluster head based on the previous calculations.
The transmit power of the malicious user obtained from the previous step is PT', and preferably, the transmit power of the malicious user may also be modified, so as to obtain a more accurate transmit power of the malicious user, that is, the method further includes:
step 303-2: uniformly arranging a plurality of sensors, calculating the error value of the receiving power at the position of the sensor, calculating the error correction value between the positions of the adjacent sensors by adopting an interpolation method for the error value, and correcting the transmitting power at the position of the channel malicious user coordinate, namely adding the transmitting powers at the corresponding positions.
The theoretical receiving power of the sensor is P after the free space fading and the shadow fadingr', will Pr' with the true value P received by the preset sensorrAre subtracted by the difference Δ PrI.e. the error, Δ P, therer=Pr′-Pr. And then, uniformly inserting X values between the error values of two adjacent sensors to obtain error correction values of each position coordinate between the two sensors, and then correcting the transmission power at the channel malicious user coordinate.
For example, the error at the sensor 1 is Δ Pr1Error at sensor 2 is Δ Pr2And the linear distance between the sensors 1 and 2 is d, the sensor 1 is separated from the sensor 2 by a distance d on a straight line formed by the position coordinates of the sensors 1 and 21(d1<d) An error correction value ofIn this way, error correction values can be calculated for the entire investigation region.
As another implementation manner, in step 303, the interference energy distribution in the attacked channel is estimated, and an interference temperature estimation algorithm based on the Kriging method is adopted.
A large number of sensors are installed in an investigation area, and the interference temperature obtained by each sensor is changed according to the change of the spatial position due to the different positions of the sensors, but due to the correlation of signals sent by interference sources, the interference temperature of the position of each sensor has certain spatial correlation. The interference temperature value obtained by each sensor is the observed value of the space variable model, and the interference temperature space distribution in the area under examination can be estimated by using a Kriging method according to the observed value. See in particular the following documents: interference temperature spatial distribution estimation [ J ] Chongqing university academic newspaper ISTIC EI,2011 and 34(2) based on Kriging method in Von Wenjiang, Lijun cognitive radio.
Preferably, the interference estimation method based on imitating the attack of the master user in the cognitive radio network of the present invention, as shown in fig. 6, further includes: step 304, constructing an interference situation map of the channel, where the step is only for facilitating understanding of an interference display mode of the channel, and is not a necessary step for implementing the present invention, and specifically, the step is:
1. and calculating the distribution value of the interference energy by the following method:
Pr′=PT′-PL (3)
in the formula (3), the reaction mixture is,Pr' interference energy, P, that can be received at each coordinate pointtIs the transmission power of the interference source, PLsIn order to be a loss caused by the shadow effect,for free space path loss, preferably the free space path loss adopts the HATA model, i.e.
From the above three equations, the received power Pr' and Pt、fc、hte、hreAnd d are related.
Under the condition that the same transmitting power is the same and the working frequency is different at the same transmitting point and the same receiving point, the difference value of the receiving power is as follows:
because of the fact thatTherefore, it is not only easy to use
Since for the same MU and the same SU,hte、hred are all equal, so
ΔPr′=26.16[log(f1/f2)]-[a1(hre)-a2(hre)]
In the HATA model, a (h) is used for urban environments of different scalesre) Different. For large cities, the mobile antenna correction factors are:
a(hre)=8.29(log1.54hre)2-1.1dB fc≤300MHz
a(hre)=3.2(log11.75hre)2-4.97dB fc≥300MHz
for medium and small cities, it is:
a(hre)=(1.1logfc-0.7)hre-(1.56logfc-0.8)dB
from the above analysis, it can be seen that, for the same transmission point, the power of the signals transmitted at two times is the same but the working frequency fcDifference value delta P of receiving power of same SU under different conditionsrOnly with the centre frequency f of the two channelscIt is related. Therefore, set as
=26.16[log(f1/f2)]-[a1(hre)-a2(hre)]+xn
2. Drawing interference situation map
And adding the error correction value to the calculated value of the interference energy distribution, so that a relatively real interference situation map showing the interference energy distribution in the investigation region can be drawn.
According to the method, the cognitive user senses the surrounding radio environment to detect whether the malicious user exists in the channel or not and estimate the interference energy distribution of the malicious user, an interference situation graph is further established, the energy of the main user is separated from the energy of the malicious user, the interference energy distribution of the malicious user can be reflected, and an accurate spectrum situation graph can be obtained by combining with a spectrum cavity detection means.
The interference situation diagrams are shown in fig. 7 and 8, wherein the colors of the coils in the diagrams are from dark to light, which indicates that the interference power received by the secondary user is decreased from large. Black indicates that the SU receives the largest amount of interference energy, e.g., A, B, C (which are also the locations of malicious users); as the color becomes lighter, the interference energy that the SU can receive becomes smaller, as indicated by the blank area shown in the lower left corner of the figure, where it is almost undisturbed. The interference power in the graph can reach 20dB at most and is only-15 dB at least, if the interference power at a certain position is smaller than the signal-to-noise ratio threshold of a receiver, the channel can still be used under the condition that the channel is known to be attacked by counterfeiting; however, if the interference power is greater than the snr threshold of the receiver, it is not suitable to use the channel.
Fig. 7 is an interference energy distribution situation of an actual malicious user in a T period and a channel i, and fig. 8 is an interference energy distribution situation of a malicious user in a T period and a channel i estimated by using the method. Comparing fig. 7 and 8, it can be seen that the coordinates of the areas with the same color shades in the lines in fig. 7 and 8 are also approximately the same, which indicates that the interference power with the same size in the two figures is approximately the same in the distribution position, and the method can estimate the interference energy distribution more accurately. The cluster head distributes channels to the SU according to the interference energy distribution map of the malicious user obtained by the scheme, so that the successful communication probability is greatly improved, namely, the communication safety is improved.
The channel capacities taking into account the interference situation and not taking into account the interference situation are analyzed as follows:
definition 1: the system capacity is the sum of the average capacities of the channels in the area under consideration. The average capacity of each channel is the average value of the channel capacity which can be obtained by each trusted secondary user if accessing the primary user channel. According to the shannon formula, the maximum channel capacity which can be obtained by each trust secondary user if accessing the primary user channel is as follows:
wherein B is channel bandwidth, S is trust secondary user transmitting power, NiReceived power, i.e. interference power, for trusted secondary users to malicious users, N0As is other noise interference on the channel.
From equation (4), the capacity of the i-th cognitive user based on the interference situation map is
The capacity of the ith cognitive user without considering the interference situation is
As can be seen from a comparison of equations (5) and (6), the channel capacities in the two cases differ from each other in the presence of a spoofing attack. Since the latter does not consider the attack situation, when there is a counterfeit attack, the latter may misunderstand as a primary user and give up the dominance for the channel, so that the channel capacity is 0.
Definition 2: capacity C of ith channeliThe capacity of the channel is averaged for each trusted secondary user in the system. System capacity CSIs the sum of the capacity of each channel, is
For the whole system, the channel capacity under attack can be obtained by considering the spectrum situation diagram of the interference situation, and the capacity of the system is further improved. When there is only one malicious user in the systemThe difference value of the system capacity under the two methods is Delta CS=Blog[1+S/(Ni+N0)]When m malicious users exist, the capacity difference value Delta C of the systemS=mBlog[1+S/(Ni+N0)]So the system capacity difference is larger when there are more malicious users. But this trend is decreasing as the number of malicious users is greater than the number of channels. Because when the number of the malicious users is equal to the number of the channels, each time one MU is added, N is addediContinued increase in the molecular weight of C (N) obtained from the formula (5)i) The system capacity is further reduced, that is, the capacity obtained by 1 MU attacking one channel or 2 attacking the same channel formula (5) is different; since the equation (6) does not have such a difference, the capacity decrease tendency becomes significantly slow when the number of MUs is equal to the number of channels.
Fig. 9 shows the system capacity of the multi-channel multi-malicious user environment of the present invention, which is higher than the system capacity of the cognitive network in the ZHANG method.
The purpose, technical solutions and advantages of the present invention are further described in detail by using the embodiments or examples of the present invention, it should be understood that the above embodiments or examples are only preferred embodiments of the present invention, and are not intended to limit the present invention, and any modifications, equivalents, improvements, etc. made within the spirit and principle of the present invention should be included in the protection scope of the present invention.
Claims (6)
1. The interference estimation method of the cognitive radio network based on imitating the attack of the master user comprises the following steps: trusting the secondary user to receive the channel power, utilize the channel power to detect whether any channel in the cognitive radio network is occupied, will channel occupation state and channel power send to the cluster head; the cluster head judges whether the occupied channel is attacked or not; estimating the interference energy distribution of the attacked channel; the method is characterized in that:
wherein, the cluster head judges whether the occupied channel is attacked or not, including: the cluster head judges whether the channel is occupied according to the channel occupation condition judged by each user and sent by each user; the method comprises the following steps: if a user thinks that the channel is occupied by a suspected master user, the channel is regarded as occupied, the cluster head obtains the number of the information sources of the occupied channel, and whether the channel is attacked or not is judged according to the number of the information sources; if all users consider that the channel is not occupied, the channel is in an idle state;
modifying the interference energy distribution, comprising: uniformly arranging a plurality of sensors, calculating a receiving power error value at the position of the sensor, calculating an error correction value between adjacent sensor positions by adopting an interpolation method for the error value, and correcting the transmitting power of the channel malicious user coordinate; calculating a receiving power error value at the position of the sensor, wherein the receiving power error value is obtained by subtracting a theoretical receiving power of the sensor from a real value received by a preset sensor;
calculating error correction values for the entire investigation region, including: on a straight line formed by the position coordinates of the sensor 1 and the sensor 2, a distance d from the sensor 11An error correction value ofWherein Δ Pr1Error at sensor 1, Δ Pr2Is the error at sensor 2 and d is the linear distance between sensors 1 and 2.
2. The interference estimation method based on imitating the attack of the master user in the cognitive radio network according to claim 1, characterized in that: the detecting whether any channel in the cognitive radio network is occupied by using the channel power includes: if P exists on the channelrk≥TmDetermining that the channel is occupied by a suspected main user, wherein TmAs interference threshold, PrkThe channel power of channel r received for the kth trusted secondary user.
3. The interference estimation method based on imitating the attack of the master user in the cognitive radio network according to claim 1, characterized in that: and the number of the cluster heads acquiring the information sources of the occupied channels adopts a Gauss circle radius method.
4. The interference estimation method based on imitating the attack of the master user in the cognitive radio network according to claim 1, characterized in that: the judging whether the channel is attacked or not according to the number of the information sources comprises the following steps: if the number n of the information sources is more than or equal to 2, the channel is in the attack of the counterfeit master user.
5. The interference estimation method based on imitating the attack of the master user in the cognitive radio network according to claim 1, characterized in that: the judging whether the channel is attacked or not according to the number of the information sources comprises the following steps: if the number n of the information sources is 1, then:
(1) firstly, determining whether the channel is in an occupied state, if Δ PrIf' is less than or equal to the preset threshold, the channel is in an occupied state; wherein,
=26.16[log(f1/f2)]-[a1(hre)-a2(hre)]+xn,is a period T1At a certain point pair with center frequency f1The received power of the channel of (a),is a period T2At the same position point pair with center frequency f2Channel received power of a1(hre)、a2(hre) For shifting the antenna correction factor, xnIs the average system noise;
(2) judging whether the channel has malicious interference users, if so, judging that the channel has the malicious interference users; wherein,
6. The interference estimation method based on imitating the attack of the master user in the cognitive radio network according to claim 1, characterized in that: the estimating of the interference energy distribution of the attacked channel includes estimating coordinates and transmission power of a malicious user of the channel, and specifically includes:
303-1A, estimating the angle of arrival of each source at the array antenna 1And the angle of arrival at the array antenna 2
303-1B, angle of arrival theta at array antennas 1 and 2 according to source iiAnd θ'iAnd the coordinates (a) of the array antennas 1,21,b1)、(a2,b2) Solving the equation y of the straight line where the malicious information source is locatedi=tanθi(xi-a1)+b1And yi=tanθ'i(xi-a1)+b1;
303-1C, solving s intersection points containing the coordinates of the malicious information source according to the equation of the straight line where the malicious information source is located, determining the coordinates of the malicious user from the s intersection points, and determining the transmitting power of the malicious user.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410005815.9A CN103746756B (en) | 2014-01-06 | 2014-01-06 | Cognitive radio networks interference estimation method based on simulated main customer attack |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410005815.9A CN103746756B (en) | 2014-01-06 | 2014-01-06 | Cognitive radio networks interference estimation method based on simulated main customer attack |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103746756A CN103746756A (en) | 2014-04-23 |
CN103746756B true CN103746756B (en) | 2016-08-31 |
Family
ID=50503752
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410005815.9A Active CN103746756B (en) | 2014-01-06 | 2014-01-06 | Cognitive radio networks interference estimation method based on simulated main customer attack |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103746756B (en) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105554739B (en) * | 2015-12-08 | 2018-09-28 | 浙江大学 | Primary user based on channel multi-path delay inequality emulates attack detection method |
CN105979590B (en) * | 2016-04-27 | 2019-04-16 | 西安交通大学 | User's scheduling and power distribution method in cognitive radio system based on available capacity |
CN106028290A (en) * | 2016-05-06 | 2016-10-12 | 浙江工业大学 | WSN multidimensional vector fingerprint positioning method based on Kriging |
CN106714336B (en) * | 2016-10-25 | 2020-02-21 | 南京邮电大学 | Wireless sensor network temperature monitoring method based on improved kriging algorithm |
CN107086921B (en) * | 2017-04-18 | 2020-04-24 | 桂林电子科技大学 | User identity identification method based on small cell spectrum auction system |
CN107483413B (en) * | 2017-07-25 | 2021-01-19 | 西安电子科技大学 | Bidirectional intrusion detection method and system based on cloud computing |
CN108174379B (en) * | 2018-02-09 | 2020-09-11 | 东南大学 | Malicious user identification method and device based on support vector machine and threshold screening |
CN108683642B (en) * | 2018-04-25 | 2019-03-15 | 长沙学院 | The detector and detection method of smart grid line status wrong data injection attacks |
CN113692012B (en) * | 2021-07-14 | 2024-05-14 | 成都长城开发科技股份有限公司 | Wireless noise detection system, method, device, electronic equipment and storage medium |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1933665A (en) * | 2006-10-12 | 2007-03-21 | 重庆邮电大学 | Mobile communication system user certification method |
-
2014
- 2014-01-06 CN CN201410005815.9A patent/CN103746756B/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1933665A (en) * | 2006-10-12 | 2007-03-21 | 重庆邮电大学 | Mobile communication system user certification method |
Non-Patent Citations (2)
Title |
---|
一种基于PUE恶意干扰的认知无线电态势感知方案;李方伟、冯德俊、朱江;《电信科学》;20131220;第21-27页 * |
基于能量指纹匹配的无线认知网络仿冒主用户攻击检测;逄德明、胡罡、徐明;《计算机科学》;20110315;第28-33页 * |
Also Published As
Publication number | Publication date |
---|---|
CN103746756A (en) | 2014-04-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103746756B (en) | Cognitive radio networks interference estimation method based on simulated main customer attack | |
Jo et al. | Selfish attacks and detection in cognitive radio ad-hoc networks | |
TWI618435B (en) | Uplink detection method and device in non-orthogonal multiple access system | |
de Lima Pinto et al. | A machine learning approach for detecting spoofing attacks in wireless sensor networks | |
CN106664263A (en) | Method and apparatus for interference estimation in wireless communication networks | |
CN103297159A (en) | Spectrum sensing method and device | |
CN107426212B (en) | Agent-based intrusion detection method in cognitive wireless network | |
Hu et al. | A spatiotemporal approach for secure crowdsourced radio environment map construction | |
Zhang et al. | ReDiSen: Reputation-based secure cooperative sensing in distributed cognitive radio networks | |
CN107332855B (en) | Main user simulation attack detection method based on reinforcement learning algorithm | |
CN106059639A (en) | Matrix Gerschgorin circle based transmitting antenna number blind estimation method | |
Xu et al. | Towards a secure medium access control protocol for cluster-based underwater wireless sensor networks | |
Ghaznavi et al. | A low complexity cluster based data fusion to defense against SSDF attack in cognitive radio networks | |
Khaliq et al. | Defence against PUE attacks in ad hoc cognitive radio networks: a mean field game approach | |
CN105429913B (en) | More level detections of feature based value and recognition methods | |
WO2019238789A1 (en) | Method for determining a relay attack, relay attack detecting device, and computer program | |
CN110190917B (en) | Frequency spectrum hole sensing method, device and equipment for LTE230MHz power wireless private network | |
CN106972900A (en) | Based on broad sense T2The blind frequency spectrum sensing method of statistic | |
Clement | Jettison the defectives: a robust cooperative spectrum sensing scheme in a cognitive radio network | |
Li et al. | Active RIS assisted spectrum sharing: Able to achieve energy-efficient notable detection performance gains | |
Wang et al. | Time-frequency component-aware convolutional neural network for wireless interference classification | |
Liu et al. | Maximum-minimum eigenvalue detection-based method to mitigate the effect of the PUEA in cognitive radio networks | |
Qing et al. | Smart antennas aided wideband detection for spectrum sensing in cognitive radio networks | |
CN105743594B (en) | Primary user's bogus attack detection method based on cooperation among users in a kind of cognitive radio system | |
Das et al. | An intelligent resource management scheme for SDF-based cooperative spectrum sensing in the presence of primary user emulation attack |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |