CN111770499A - A distributed spectrum cooperative detection method - Google Patents

A distributed spectrum cooperative detection method Download PDF

Info

Publication number
CN111770499A
CN111770499A CN202010586269.8A CN202010586269A CN111770499A CN 111770499 A CN111770499 A CN 111770499A CN 202010586269 A CN202010586269 A CN 202010586269A CN 111770499 A CN111770499 A CN 111770499A
Authority
CN
China
Prior art keywords
node
value
nodes
message
reputation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010586269.8A
Other languages
Chinese (zh)
Other versions
CN111770499B (en
Inventor
付鸿川
黄文才
史治平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Electronic Science and Technology of China
Original Assignee
University of Electronic Science and Technology of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Electronic Science and Technology of China filed Critical University of Electronic Science and Technology of China
Priority to CN202010586269.8A priority Critical patent/CN111770499B/en
Publication of CN111770499A publication Critical patent/CN111770499A/en
Application granted granted Critical
Publication of CN111770499B publication Critical patent/CN111770499B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B17/00Monitoring; Testing
    • H04B17/30Monitoring; Testing of propagation channels
    • H04B17/309Measuring or estimating channel quality parameters

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明属于认知无线电中的协作频谱感知领域,具体涉及一种分布式频谱协作检测方法。本发明提出基于信誉值的思想解决节点遭受持续SSDF攻击的问题,仅需一次感知,将每条消息的历史传播路径当作计算每个认知用户信誉的依据,每当节点接收到来自同一认知用户的不同消息,则其传播路径上一定存在恶意用户,对在不同路径上出现次数较多的节点进行信誉值奖励,对出现较少的节点进行信誉值惩罚。最后,根据计算出的信誉值还原被篡改消息的真实值。经仿真分析表明,本发明的方法对消息有较高的还原率,并同时识别出网络中的恶意用户。The invention belongs to the field of cooperative spectrum sensing in cognitive radio, and in particular relates to a distributed spectrum cooperative detection method. The invention proposes an idea based on reputation value to solve the problem that nodes suffer from continuous SSDF attacks. Only one perception is needed, and the historical propagation path of each message is used as the basis for calculating the reputation of each cognitive user. If the user knows different information about the user, there must be malicious users on the propagation path. The nodes that appear more frequently on different paths will be rewarded with reputation value, and the nodes that appear less frequently will be punished with reputation value. Finally, the true value of the tampered message is restored according to the calculated reputation value. Simulation analysis shows that the method of the present invention has a higher recovery rate for messages, and at the same time identifies malicious users in the network.

Description

一种分布式频谱协作检测方法A distributed spectrum cooperative detection method

技术领域technical field

本发明属于认知无线电中的协作频谱感知领域,具体涉及一种分布式频谱协作检测方法。The invention belongs to the field of cooperative spectrum sensing in cognitive radio, and in particular relates to a distributed spectrum cooperative detection method.

背景技术Background technique

在过去的十年中,对无线设备及应用的需求激增,可用的许可频谱仍未得到正确的利用,频谱感知技术应运而生,通过频谱感知技术,可以检测出网络中的空闲频谱,认知用户通过动态接入频谱,可以提高频谱利用率。常见的单用户频谱感知,感知性能较差,存在多径效应和阴影衰落等问题,因此在此基础上提出了协作式频谱感知。其中,协作式频谱感知又分为集中式和分布式两种。集中式协作频谱感知必须要有融合中心,所有的数据都需要发送到融合中心进行处理,由融合中心进行判决。集中式作频谱感知具有很多局限性,因此提出了去中心化的分布式协作频谱感知。分布式协作频谱感知收敛更快,判决结果更加可靠。In the past decade, the demand for wireless devices and applications has surged, and the available licensed spectrum has not been properly utilized. Spectrum sensing technology has emerged. Through spectrum sensing technology, idle spectrum in the network can be detected, cognitive By dynamically accessing the spectrum, users can improve spectrum utilization. Common single-user spectrum sensing has poor sensing performance, and there are problems such as multipath effect and shadow fading. Therefore, cooperative spectrum sensing is proposed on this basis. Among them, cooperative spectrum sensing is divided into two types: centralized and distributed. Centralized cooperative spectrum sensing must have a fusion center, and all data needs to be sent to the fusion center for processing, and the fusion center makes a decision. Centralized spectrum sensing has many limitations, so a decentralized distributed cooperative spectrum sensing is proposed. Distributed cooperative spectrum sensing has faster convergence and more reliable decision results.

常见的有基于平均共识的分布式协作频谱感知,但该方法在消息传递过程中易受恶意节点的攻击,恶意的次用户节点(Secondary User,SU)会改变感知值,伪造虚假的感知值,即拜占廷攻击(Spectrum Sensing Data Falsification,SSDF)。因此,最近有学者提出了一种消息传递算法它通过消息在SU节点中不断传递,但不改变感知值,使得每个SU节点最终能获得其h跳邻居节点的感知值,把这些感知值作为整个网络感知值的近似,每个SU节点当作一个融合中心进行集中式的算法,从而获得与集中式算法相似的性能。Distributed cooperative spectrum sensing based on average consensus is common, but this method is vulnerable to malicious nodes in the process of message transmission. Malicious secondary user nodes (SU) will change the sensing value and forge false sensing values. That is Byzantine attack (Spectrum Sensing Data Falsification, SSDF). Therefore, some scholars recently proposed a message passing algorithm, which continuously transmits messages in SU nodes without changing the perception value, so that each SU node can finally obtain the perception value of its h-hop neighbor nodes, and use these perception values as The approximation of the perception value of the entire network, each SU node is used as a fusion center to perform a centralized algorithm, so as to obtain similar performance to the centralized algorithm.

消息传递算法虽然能有效对抗SSDF攻击,但是没有考虑到恶意SU节点在传递消息时可以篡改消息内容的情况,即持续SSDF攻击。Although the message passing algorithm can effectively resist SSDF attacks, it does not consider the situation that malicious SU nodes can tamper with the message content when transmitting messages, that is, continuous SSDF attacks.

发明内容SUMMARY OF THE INVENTION

本发明的目的在于,针对分布式协作频谱感知易受恶意SU节点攻击,感知值被篡改的问题,提出了一种分布式频谱协作检测方法解决这个问题,引入了信誉值,通过检测将信誉值偏差过大的SU节点作为恶意SU节点排除在共识融合之外,可以减轻SSDF攻击产生的影响,该方案开销低,并且可以抵抗持续SSDF攻击。本发明通过SU节点之间互相传递消息,在h次迭代之后,每个SU节点都拥有它的h跳邻居SU节点的感知结果,最后再通过一些集中式下对抗SSDF的算法,如异常值检测算法等,将恶意节点识别出来,获得最终的感知结果,当h足够大时(不小于图的直径),此算法能获得与集中式算法相同的性能。在消息传递算法中引入信誉值,通过综合分析消息传递的路径和消息传递的感知值,给予消息传递路径上每个SU节点不同的信誉值,最终通过信誉值的大小找到恶意SU节点,并将恶意SU节点排除在共识融合之外。获得h跳邻居SU节点正确的感知值,大大增加了判决结果的可靠性。,没有特殊说明外,本发明中所有节点皆是指SU节点。The purpose of the present invention is to propose a distributed spectrum cooperative detection method to solve the problem that distributed cooperative spectrum sensing is vulnerable to attack by malicious SU nodes and the sensing value is tampered with, and introduces a reputation value. SU nodes with excessive deviation are excluded from consensus fusion as malicious SU nodes, which can mitigate the impact of SSDF attacks. This scheme has low overhead and can resist continuous SSDF attacks. The present invention transmits messages between SU nodes. After h iterations, each SU node has the perception results of its h-hop neighbor SU nodes. Finally, through some centralized algorithms against SSDF, such as outlier detection Algorithms, etc., identify malicious nodes and obtain the final perception result. When h is large enough (not less than the diameter of the graph), this algorithm can obtain the same performance as the centralized algorithm. The reputation value is introduced into the message passing algorithm. By comprehensively analyzing the message passing path and the perception value of the message passing, each SU node on the message passing path is given a different reputation value, and finally the malicious SU node is found by the size of the reputation value, and the Malicious SU nodes are excluded from consensus fusion. Obtaining the correct perception value of the h-hop neighbor SU node greatly increases the reliability of the decision result. , unless otherwise specified, all nodes in the present invention refer to SU nodes.

本发明采用的技术方案为:The technical scheme adopted in the present invention is:

一种分布式频谱协作检测方法,包括以下步骤:A distributed spectrum cooperative detection method, comprising the following steps:

S1、每个节点都向其相邻的节点广播消息M,直到广播到h跳邻居节点为止,即所有的消息M都将到达h跳邻居节点;消息M的格式为[SRC,PRE,RD],其中SRC是消息的始发者ID,PRE包含消息传播路径中经过的SU节点信息,RD是SRC的本地原始数据,即本地检测的感知值;节点广播消息时,将途径节点的ID增加到PRE中;每个节点都有用于存储来自不同节点消息的本地消息库;S1. Each node broadcasts message M to its adjacent nodes until it is broadcast to h-hop neighbor nodes, that is, all messages M will reach h-hop neighbor nodes; the format of message M is [SRC, PRE, RD] , where SRC is the originator ID of the message, PRE contains the information of SU nodes passed in the message propagation path, RD is the local original data of SRC, that is, the perception value of local detection; when the node broadcasts the message, the ID of the path node is added to In PRE; each node has a local message store for storing messages from different nodes;

S2、根据本地消息库中存储的所有消息,计算每个节点的信誉值,具体为:S2. Calculate the reputation value of each node according to all the messages stored in the local message database, specifically:

将本地消息库中的所有消息按照不同的SRC分类,对于不同的SRC类,若存在Nr种不同的RD值,Nj≥1,则进入步骤S21,否则进入步骤S22;All messages in the local message library are classified according to different SRCs. For different SRC classes, if there are N r different RD values, and N j ≥ 1, then go to step S21, otherwise go to step S22;

S21、根据每个存在于这个SRC类的传播路径中存在的节点在不同RD值出现的次数更新信誉值,假设节点j在这一SRC分类中出现了Nj次,Nr≥Nj≥1,则节点i的信誉值更新为:S21. Update the reputation value according to the number of occurrences of different RD values of each node existing in the propagation path of this SRC class, assuming that node j appears N j times in this SRC classification, N r ≥ N j ≥ 1 , then the reputation value of node i is updated as:

Figure BDA0002554769850000021
Figure BDA0002554769850000021

其中,Rij是节点i对节点j的信誉值,p为奖惩因子,进入步骤S23;Among them, R ij is the reputation value of node i to node j, p is the reward and punishment factor, and go to step S23;

S22、该类SRC值为节点i本身ID,即消息经过一个环路又传回到了这个节点中,对环路中每一个节点j,信誉值为:S22. This type of SRC value is the ID of the node i itself, that is, the message is transmitted back to this node through a loop. For each node j in the loop, the reputation value is:

Rij=Rij+pdetermin R ij =R ij +p determin

其中,pdetermin为确定性奖励因子,进入步骤S23;Among them, p determin is a deterministic reward factor, and enter step S23;

S23、重复步骤S2,直至每个SU根据本地消息库获得该SU对所有SRC类中包含的所有途径节点的信誉值后,将获得的信誉值按从高到低的方式排序,将信誉值低于设定阈值的节点标记为恶意节点;S23. Step S2 is repeated until each SU obtains the reputation values of the SU for all path nodes included in all SRC classes according to the local message base, and then sorts the obtained reputation values from high to low, and ranks the reputation values with the lowest reputation value. Nodes below the set threshold are marked as malicious nodes;

S3、进行离群值检测:信誉值检测只能去掉篡改了感知值的恶意节点,但针对本身发送偏差较大感知值的恶意节点没办法去除,于是使用了离群值检测去掉这类恶意节点。将步骤S2获得恶意节点排除后,对剩下的节点,每个节点从h跳邻居获得一组能量值,用Xi=(xi0,xi1,xi2,…xir)向量表示接收到的能量值,按升序将集合Xi分为XLHi和XUHi两部分,其中XLHi是下半部分的能量值集合,XUHi是上半部分的能量值集合,将下半部分的能量值表示为(L1<L2<L3…Lh),上半部分的能量值表示为(U1<U2<U3…Uh),分别计算两个部分的连续数据点之间的间隙,并分别从集合XLHi和XUHi中找出最大间隙PLHi和PUHi的位置,将位置PLHi的节点和位于其左侧的节点标记为低离群值,位置PUHi和位于其右侧的节点标记为高离群值;S3. Perform outlier detection: Reputation value detection can only remove malicious nodes that have tampered with the perception value, but there is no way to remove malicious nodes that send large deviations in perception value, so outlier detection is used to remove such malicious nodes . After excluding the malicious nodes obtained in step S2, for the remaining nodes, each node obtains a set of energy values from its h-hop neighbors, and uses X i =(x i0 ,x i1 ,x i2 ,...x ir ) vector to represent the received The energy value of X i is divided into two parts, X LHi and X UHi in ascending order, where X LHi is the energy value set of the lower half, X UHi is the energy value set of the upper half, and the energy value of the lower half is divided into two parts. Denoted as (L 1 <L 2 <L 3 ...L h ), the energy value of the upper half is expressed as (U 1 <U 2 <U 3 ...U h ), respectively calculating the difference between the consecutive data points of the two parts gaps, and find the positions of the largest gaps P LHi and P UHi from the sets X LHi and X UHi respectively, mark the nodes at the position P LHi and the nodes located to the left of them as low outliers, and the positions P UHi and the nodes at its left Nodes on the right are marked as high outliers;

S4、将标记为低离群值和高离群值的节点排除后,节点i根据剩下的感知值取平均后计算出对主用户感知值的估计值Yi并与设定的门限值进行比较,如果估计值Yi大于门限值,则主用户存在;如果估计值Yi小于门限值,则主用户不存在。通常情况下,各节点感知值取平均,可作为感知值的估计值进行感知判决。S4. After excluding the nodes marked as low outliers and high outliers, node i calculates the estimated value Y i of the main user's perception value after averaging the remaining perception values and compares it with the set threshold value , if the estimated value Y i is greater than the threshold value, the primary user exists; if the estimated value Yi is less than the threshold value, the primary user does not exist. Usually, the average of the sensing values of each node can be used as the estimated value of the sensing value to make a sensing decision.

本发明的有益效果为:本发明提出的基于信誉的非共识消息传递算法,采用了在消息传递算法的基础上增加信誉值,通过综合分析消息传递的路径和消息传递的感知值,给予消息传递路径上每个节点不同的信誉值,最终通过信誉值的大小找到恶意用户,获得h跳邻居节点正确的感知值。在所有情况下,本发明提出的基于信誉的消息传递算法在恶意用户攻击下,均能有效提高识别恶意用户的能力。值得一提的是,本发明所提的基于信誉值的算法性能不受恶意用户发动攻击的大小影响,只取决于恶意用户是否发动了恶意攻击。The beneficial effects of the invention are as follows: the reputation-based non-consensus message delivery algorithm proposed by the invention adopts the method of increasing the reputation value on the basis of the message delivery algorithm. The reputation value of each node on the path is different, and finally the malicious user is found by the size of the reputation value, and the correct perception value of the h-hop neighbor node is obtained. In all cases, the reputation-based messaging algorithm proposed in the present invention can effectively improve the ability to identify malicious users under malicious user attacks. It is worth mentioning that the performance of the algorithm based on the reputation value proposed in the present invention is not affected by the size of the attack launched by the malicious user, but only depends on whether the malicious user launched a malicious attack.

附图说明Description of drawings

图1是普通奖惩示意图;Figure 1 is a schematic diagram of ordinary rewards and punishments;

图2是环路奖励示意图;Figure 2 is a schematic diagram of the loop reward;

图3是离群值检测算法流程图;Fig. 3 is the flow chart of outlier detection algorithm;

图4是恶意用户识别性能图;Fig. 4 is a malicious user identification performance graph;

图5是频谱感知性能对比图。Figure 5 is a comparison diagram of spectrum sensing performance.

具体实施方式Detailed ways

下面结合附图和仿真示例对本发明的技术方案做进一步详细描述:Below in conjunction with accompanying drawing and simulation example, the technical scheme of the present invention is described in further detail:

本发明的方法,主要包括:The method of the present invention mainly includes:

第一步产生消息M并转发。消息传递过程与原始的消息传递算法略有不同,每个SU都向相邻的SU广播消息M,直到广播到h跳邻居节点为止。消息M包含[SRC,PRE,RD],其中SRC是消息的始发者,PRE是消息传递的传播路径SU节点,RD是SRC的本地原始数据,即本地检测的感知值。SU生成消息M时,将ID设置为SRC字段,将本地数据设置为RD。SU广播消息时,会使用途经SU节点的ID增加消息M的PRE字段内容。The first step generates a message M and forwards it. The message passing process is slightly different from the original message passing algorithm, each SU broadcasts a message M to neighboring SUs until it reaches h-hop neighbor nodes. The message M contains [SRC, PRE, RD], where SRC is the originator of the message, PRE is the SU node of the message transmission path, and RD is the local original data of SRC, that is, the perception value of local detection. When the SU generates the message M, it sets the ID to the SRC field and the local data to the RD. When the SU broadcasts the message, it will add the content of the PRE field of the message M through the ID of the SU node.

每个SU都有一个本地的消息库,用于存储来自不同SU的消息。SUj进一步检查消息M的[SRC,RD]字段是否存在本地缓冲区。如果这个字段已经存在,SUj会将新消息M中[PRE]字段里不在消息库[SRC,RD]传播路径节点中的节点ID加入到传播路径中;如果这个字段不存在,SUj会将新消息M保存在消息库中。此外,如果消息的传播路径[PRE]中有本节点,意味着这条消息已经经过一个环路,则停止转发此消息,否则,节点将自己的ID加入到这条消息的历史传播途径[PRE]字段中并转发。在协作频谱感知的过程中,网络中的每个SU都会广播消息M。经过h次转发,此时,所有的消息M都将到达h跳邻居SU节点。Each SU has a local message store for storing messages from different SUs. SU j further checks the [SRC, RD] field of message M for the existence of a local buffer. If this field already exists, SU j will add the node ID in the [PRE] field of the new message M that is not in the propagation path node of the message base [SRC, RD] to the propagation path; if this field does not exist, SU j will add the node ID to the propagation path. The new message M is stored in the message library. In addition, if there is this node in the propagation path [PRE] of the message, which means that the message has passed through a loop, stop forwarding this message, otherwise, the node will add its own ID to the historical propagation path [PRE] of this message ] field and forward. In the process of cooperative spectrum sensing, each SU in the network broadcasts a message M. After h times of forwarding, all messages M will reach the h-hop neighbor SU node at this time.

第二步是根据消息计算每个节点的信誉值。是基于信誉的非共识消息传递算法的核心。与传统基于信任的共识算法不同,本算法的每个SU节点不仅计算邻居SU节点的信誉值,同时对接收到的所有消息中途经的SU节点都计算信誉值,具体规则如下:The second step is to calculate the reputation value of each node based on the message. is the core of reputation-based non-consensus messaging algorithms. Different from the traditional trust-based consensus algorithm, each SU node of this algorithm not only calculates the reputation value of the neighboring SU nodes, but also calculates the reputation value of all the SU nodes in the way of the received messages. The specific rules are as follows:

(1)消息库按照不同的SRC分类,对于不同的SRC类,假设存在Nr种不同的RD值,则根据每个存在于这个SRC类的传播路径中存在的节点在不同RD值出现的次数更新信誉值。例如,假设节点j在这一SRC分类中出现了Nj次,(Nr≥Nj≥1),则节点i的信誉值更新为:(1) The message base is classified according to different SRCs. For different SRC classes, assuming that there are N r different RD values, then according to the number of occurrences of different RD values of each node existing in the propagation path of this SRC class Update the reputation value. For example, assuming that node j appears N j times in this SRC classification, (N r ≥ N j ≥ 1), the reputation value of node i is updated as:

Figure BDA0002554769850000041
Figure BDA0002554769850000041

其中,Rij是节点i对节点j的信誉值。p为奖惩因子。可以看到,对节点的信誉值更新是根据节点在不同RD值的传播路径中出现的次数来决定的。出现的次数多,则奖励,次数少,则惩罚。这是因为不同的RD值是由于恶意节点的iRDA攻击造成的,当一个节点在不同RD传播路径中出现的次数越多,则由它造成RD值不同的可能性越低,反之,如果它在不同RD传播路径中出现的次数越少,则它就是恶意节点的可能性就越大。Among them, Rij is the reputation value of node i to node j. p is the reward and punishment factor. It can be seen that the update of the reputation value of the node is determined according to the number of times the node appears in the propagation path of different RD values. The more occurrences, the reward, the less the penalty. This is because different RD values are caused by iRDA attacks of malicious nodes. The more times a node appears in different RD propagation paths, the lower the possibility of different RD values caused by it. The fewer occurrences of different RD propagation paths, the more likely it is a malicious node.

通过举例对信誉值计算进行说明,图1是普通奖惩示意图,如图所示,节点i到节点j有三条路径,为了更清楚地表示不同的路径,出现在不同路径的同一节点会被复制且用同样的标号表示。可以看到,通过不同的路径,节点j的消息库中最终将接收到发送节点为i但值RD不同的两条消息,该节点历史传播节点集合分别为{1,2}和{1,3,4,5},可以看到,由于节点1出现在了两个路径节点集合中,则由它造成RD值的可能性较低,根据式(4-4),该节点信誉值将被加上0.25p,而其余节点,由于均只在不同的路径节点集合中出现了一次,该节点信誉将被减去0.25p,即做出惩罚。值得注意的是,节点3虽然出现在了两条不同的路径中,但在不同[SRC,RD]消息对中只出现了一次,因此会对该节点进行惩罚。The calculation of reputation value is explained by an example. Figure 1 is a schematic diagram of ordinary rewards and punishments. As shown in the figure, there are three paths from node i to node j. In order to more clearly represent different paths, the same node that appears in different paths will be copied and denoted by the same reference numerals. It can be seen that through different paths, the message library of node j will eventually receive two messages with the sending node i but the value RD is different. The historical propagation node sets of this node are {1,2} and {1,3 respectively. ,4,5}, it can be seen that since node 1 appears in the two path node sets, the possibility of causing the RD value is low. According to formula (4-4), the reputation value of this node will be added to 0.25p, and the rest of the nodes, since they only appear once in different path node sets, the reputation of the node will be reduced by 0.25p, that is, a penalty will be made. It is worth noting that although node 3 appears in two different paths, it only appears once in different [SRC,RD] message pairs, so this node will be penalized.

(2)在所有SRC分类中,有一类是比较特殊的,即SRC值为节点i本身,消息经过一个环路又传回到了这个节点中,在这一类消息中,由于对正确的RD值已知,节点可以传播路径上的节点有更加明确的判断。对RD值等于原始RD值的传播路径节点的信誉值可以大幅增加,即:(2) Among all SRC classifications, one is special, that is, the SRC value is node i itself, and the message is transmitted back to this node through a loop. In this type of message, due to the correct RD value It is known that nodes on the propagation path have more explicit judgments. The reputation value of a propagation path node whose RD value is equal to the original RD value can be greatly increased, namely:

Rij=Rij+pdetermin j∈Ncorrect (2)R ij =R ij +p determin j∈N correct (2)

其中,pdetermin为确定性奖励因子,Ncorrect为包含正确[SRC,RD]字段对[i,Pi]的路径节点集合。Among them, p determin is the deterministic reward factor, and N correct is the set of path nodes containing the correct [SRC, RD] field pair [i, P i ].

存在一种特殊的情况,各节点形成一个环路,如图2所示。由于经过一个环路,节点i接收到了正确的消息,则环路上所有节点均会被大幅度奖励。There is a special case where each node forms a loop, as shown in Figure 2. Since node i receives the correct message after passing through a loop, all nodes on the loop will be greatly rewarded.

同时上述两个奖惩规则后,最终每个节点根据自己对传播路径节点信誉值的高低排序,信誉值较低的若干个节点即为检测到的恶意节点。同时,对含有不同RD值的SRC类,计算传播路径节点集合的信誉值总和,取最高者为这一SRC的RD值,RD值即是感知值,可用作后续的感知判决。At the same time, after the above two reward and punishment rules, each node finally sorts the reputation value of the propagation path nodes according to its own, and several nodes with lower reputation value are the detected malicious nodes. At the same time, for SRC classes with different RD values, the sum of the reputation values of the propagation path node set is calculated, and the highest one is the RD value of this SRC. The RD value is the perception value, which can be used for subsequent perception judgments.

第三步是进行离群值检测,排除掉恶意用户节点,将剩下节点的感知值进行融合,再与门限值进行比较从而得出最终判决。消息传递过程和信誉值计算过程结束后,每个节点i获得了排除掉恶意用户之外的h跳邻居节点的感知值,并根据这些感知值做出最后判决。由于攻击类型是通过伪造估计的能量值来发动的,因此采用最大间隙双向离群值检测来更好地识别恶意的SU,具体算法流程如图3所示。每个节点i将接收到的能量值按升序排序后,根据相邻能量值的差判断出离群的感知值。每个SUi单独执行离群值检测算法以识别离群值。The third step is to detect outliers, eliminate malicious user nodes, fuse the perception values of the remaining nodes, and compare them with the threshold to obtain the final decision. After the message passing process and the reputation value calculation process, each node i obtains the perception values of h-hop neighbor nodes excluding malicious users, and makes a final decision based on these perception values. Since the attack type is launched by falsifying the estimated energy value, maximum-gap bidirectional outlier detection is used to better identify malicious SUs. The specific algorithm flow is shown in Figure 3. Each node i sorts the received energy values in ascending order, and determines the outlier perception value according to the difference between adjacent energy values. Each SU i individually performs an outlier detection algorithm to identify outliers.

在消息传递过程结束时,每个SU从h跳邻居获得一组能量值,用Xi=(xi0,xi1,xi2,…xir)表示。然后每个SU对集合Xi进行排序,按升序分为XLHi和XUHi两部分,其中XLHi是下半部分的能量值集合,XUHi是上半部分的能量值集合。因为对XLHi进行了排序,所以能量值可以表示为(L1<L2<L3…Lh)。同样的,上半部分可以表示为(U1<U2<U3…Uh)。计算两个半部分的连续数据点之间的间隙,并分别从集合XLHi和XUHi中找出最大间隙PLHi和PUHi的位置。对应于位置PLHi的节点和位于其左侧的节点被检测为低离群值。同理,将位置PUHi和位于其右侧的那些节点相对应的节点检测为高离群值。该方法基于这样一个思想,即恶意节点的能量与诚实节点的能量相差较大,而诚实节点的能量彼此接近。因此,当对能量级别进行排序(按升序排列)并计算出能量差时,在恶意节点的能量值出现的位置会观察到最大的能量差。因此,PLHi和其左侧的所有节点都是低能量注入攻击者,PUHi和其右侧的所有节点都是高能量注入攻击者。At the end of the message passing process, each SU obtains a set of energy values from h-hop neighbors, denoted by Xi = (x i0 , x i1 , x i2 , . . . x ir ). Then each SU sorts the set Xi and divides it into two parts, X LHi and X UHi , in ascending order, where X LHi is the set of energy values in the lower half, and X UHi is the set of energy values in the upper half. Because XLHi is sorted, the energy value can be expressed as (L 1 <L 2 <L 3 . . . L h ). Likewise, the upper part can be expressed as (U 1 <U 2 <U 3 . . U h ). Calculate the gap between consecutive data points of the two halves and find the location of the largest gaps P LHi and P UHi from the sets X LHi and X UHi respectively. Nodes corresponding to position PLHi and nodes to the left of it are detected as low outliers. Likewise, nodes corresponding to positions P UHi and those located to the right of it are detected as high outliers. The method is based on the idea that the energies of malicious nodes differ greatly from those of honest nodes, and the energies of honest nodes are close to each other. Therefore, when the energy levels are sorted (in ascending order) and the energy difference is calculated, the largest energy difference is observed where the malicious node's energy value appears. Therefore, P LHi and all nodes to its left are low-energy injection attackers, and P UHi and all nodes to its right are high-energy injection attackers.

排除掉异常的离群值后,节点i根据剩下的感知值取平均后计算出对主用户感知值的估计值Yi并与设定的门限值进行比较。如果估计值Yi大于门限值,则主用户存在;如果估计值Yi小于门限值,则主用户不存在。After removing abnormal outliers, node i calculates the estimated value Y i of the perceived value of the main user after averaging the remaining perceived values and compares it with the set threshold value. If the estimated value Y i is greater than the threshold value, the primary user exists; if the estimated value Yi is smaller than the threshold value, the primary user does not exist.

在matlab平台上进行性能仿真与分析,仿真实验的网络拓扑结构皆随机产生,网络参数如下:认知用户数量为N,其中恶意用户根据设定的恶意用户概率随机产生。所有认知用户随机分布在直径为1000m的正方形区域中,且距离小于130m的认知用户为邻居节点,可互相可靠通信。所有认知用户在频谱感知期间保持位置不动。主用户距离认知用户网络5000m,发射功率为60dB,信道损失参数α为3,接收信噪比为-10dB,阴影衰落参数为3dB,相对距离d0为1000m。奖惩因子p取值为1,确定性奖励因子pdetermin取值为10。The performance simulation and analysis are carried out on the matlab platform. The network topology of the simulation experiment is randomly generated. The network parameters are as follows: the number of cognitive users is N, and the malicious users are randomly generated according to the set probability of malicious users. All cognitive users are randomly distributed in a square area with a diameter of 1000m, and the cognitive users whose distance is less than 130m are neighbor nodes and can communicate with each other reliably. All cognitive users remain in position during spectrum sensing. The main user is 5000m away from the cognitive user network, the transmit power is 60dB, the channel loss parameter α is 3, the receive signal-to-noise ratio is -10dB, the shadow fading parameter is 3dB, and the relative distance d0 is 1000m. The reward and punishment factor p takes a value of 1, and the deterministic reward factor p determin takes a value of 10.

仿真示例仿真了不同节点数下在iRDA攻击下的频谱感知性能。恶意用户比例为0.2,消息传递跳数h为3。恶意节点根据自己的本地感知结果选择发动攻击的类型,即当恶意用户检测到有主用户存在时,发动低能量注入攻击,当检测到没有主用户存在时,发动高能量注入攻击。攻击常数取值为-10dB。同时仿真了集中式下的离群检测算法和原始消息传递算法作为对比,仿真结果如图5所示。The simulation example simulates the spectrum sensing performance under iRDA attack with different number of nodes. The proportion of malicious users is 0.2, and the number of message delivery hops h is 3. The malicious node chooses the type of attack based on its local perception results, that is, when the malicious user detects the existence of the main user, it launches a low-energy injection attack, and when it detects that there is no main user, it launches a high-energy injection attack. The attack constant value is -10dB. At the same time, the centralized outlier detection algorithm and the original message passing algorithm are simulated for comparison. The simulation results are shown in Figure 5.

从图5可以看到,首先,相对于原始的消息传递算法,本发明所提的基于信任的消息传递算法有明显的性能提升,在虚警概率为0.2的条件下,网络的检测概率提高了0.3左右。同时,本发明所提算法的性能接近集中式条件下的离群值检测算法,当N=10时,虚警概率0.2下网络的性能与集中式算法只有小于0.05的差距,而当N=20时,差距增加到接近0.1,这是因为在网络节点数为20时,网络的平均直径为3.478,略高于h=3,因此每个节点并不能获得整个网络所有节点的信息。尽管如此,所提算法的感知性能仍然远高于原始的消息传递算法,证明了本发明所提算法的有效性。As can be seen from Fig. 5, first, compared with the original message passing algorithm, the trust-based message passing algorithm proposed by the present invention has obvious performance improvement. Under the condition that the false alarm probability is 0.2, the detection probability of the network is improved. 0.3 or so. At the same time, the performance of the algorithm proposed in the present invention is close to the outlier detection algorithm under centralized conditions. When N=10, the performance of the network under the false alarm probability of 0.2 is only less than 0.05 from the centralized algorithm, and when N=20 When , the gap increases to close to 0.1, because when the number of network nodes is 20, the average diameter of the network is 3.478, which is slightly higher than h=3, so each node cannot obtain the information of all nodes in the entire network. Nevertheless, the perceptual performance of the proposed algorithm is still much higher than the original message passing algorithm, which proves the effectiveness of the proposed algorithm in the present invention.

Claims (1)

1.一种分布式频谱协作检测方法,其特征在于,包括以下步骤:1. a distributed spectrum cooperative detection method, is characterized in that, comprises the following steps: S1、每个节点都向其相邻的节点广播消息M,直到广播到h跳邻居节点为止,即所有的消息M都将到达h跳邻居节点;消息M的格式为[SRC,PRE,RD],其中SRC是消息的始发者ID,PRE包含消息传播路径中经过的SU节点信息,RD是SRC的本地原始数据,即本地检测的感知值;节点广播消息时,将途径节点的ID增加到PRE中;每个节点都有用于存储来自不同节点消息的本地消息库;S1. Each node broadcasts message M to its adjacent nodes until it is broadcast to h-hop neighbor nodes, that is, all messages M will reach h-hop neighbor nodes; the format of message M is [SRC, PRE, RD] , where SRC is the originator ID of the message, PRE contains the information of SU nodes passed in the message propagation path, RD is the local original data of SRC, that is, the perception value of local detection; when the node broadcasts the message, the ID of the path node is added to In PRE; each node has a local message store for storing messages from different nodes; S2、根据本地消息库中存储的所有消息,计算每个节点的信誉值,具体为:S2. Calculate the reputation value of each node according to all the messages stored in the local message database, specifically: 将本地消息库中的所有消息按照不同的SRC分类,对于不同的SRC类,若存在Nr种不同的RD值,Nj≥1,则进入步骤S21,否则进入步骤S22;All messages in the local message library are classified according to different SRCs. For different SRC classes, if there are N r different RD values, and N j ≥ 1, then go to step S21, otherwise go to step S22; S21、根据每个存在于这个SRC类的传播路径中存在的节点在不同RD值出现的次数更新信誉值,假设节点j在这一SRC分类中出现了Nj次,Nr≥Nj≥1,则节点i的信誉值更新为:S21. Update the reputation value according to the number of occurrences of different RD values of each node existing in the propagation path of this SRC class, assuming that node j appears N j times in this SRC classification, N r ≥ N j ≥ 1 , then the reputation value of node i is updated as:
Figure FDA0002554769840000011
Figure FDA0002554769840000011
其中,Rij是节点i对节点j的信誉值,p为奖惩因子,进入步骤S23;Among them, R ij is the reputation value of node i to node j, p is the reward and punishment factor, and go to step S23; S22、该类SRC值为节点i本身ID,即消息经过一个环路又传回到了这个节点中,对环路中每一个节点j,信誉值为:S22. This type of SRC value is the ID of the node i itself, that is, the message is transmitted back to this node through a loop. For each node j in the loop, the reputation value is: Rij=Rij+pdetermin R ij =R ij +p determin 其中,pdetermin为确定性奖励因子,进入步骤S23;Among them, p determin is a deterministic reward factor, and enter step S23; S23、重复步骤S2,直至每个节点获取所有SRC类中对应的途径节点的信誉值后,将获得的信誉值按从高到低的方式排序,将信誉值低于设定阈值的节点标记为恶意节点;S23. Repeat step S2 until each node obtains the reputation values of the corresponding route nodes in all SRC classes, sort the obtained reputation values from high to low, and mark the nodes whose reputation values are lower than the set threshold as malicious node; S3、进行离群值检测:将步骤S2获得恶意节点排除后,对剩下的节点,每个节点从h跳邻居获得一组能量值,用Xi=(xi0,xi1,xi2,…xir)向量表示接收到的能量值,按升序将集合Xi分为XLHi和XUHi两部分,其中XLHi是下半部分的能量值集合,XUHi是上半部分的能量值集合,将下半部分的能量值表示为(L1<L2<L3…Lh),上半部分的能量值表示为(U1<U2<U3…Uh),分别计算两个部分的连续数据点之间的间隙,并分别从集合XLHi和XUHi中找出最大间隙PLHi和PUHi的位置,将位置PLHi的节点和位于其左侧的节点标记为低离群值,位置PUHi和位于其右侧的节点标记为高离群值;S3. Perform outlier detection: after excluding the malicious nodes obtained in step S2, for the remaining nodes, each node obtains a set of energy values from h-hop neighbors, using X i =(x i0 ,x i1 ,x i2 , ...x ir ) vector represents the received energy value, and divides the set X i into two parts, X LHi and X UHi in ascending order, where X LHi is the energy value set of the lower half, and X UHi is the energy value set of the upper half. , the energy value of the lower part is expressed as (L 1 <L 2 <L 3 ...L h ), and the energy value of the upper part is expressed as (U 1 <U 2 <U 3 ...U h ), and the two Part of the gap between consecutive data points, and find the position of the largest gap P LHi and P UHi from the sets X LHi and X UHi respectively, and mark the node at position P LHi and the node located to the left of it as low outliers value, position P UHi and nodes to the right of it are marked as high outliers; S4、将标记为低离群值和高离群值的节点排除后,节点i根据剩下的感知值取平均后获得对主用户感知值的估计值Yi并与设定的门限值进行比较,如果估计值Yi大于门限值,则主用户存在;如果估计值Yi小于门限值,则主用户不存在。S4. After excluding the nodes marked as low outliers and high outliers, node i obtains an estimated value Y i of the main user's perceived value after averaging the remaining perceived values, and compares it with the set threshold value, If the estimated value Y i is greater than the threshold value, the primary user exists; if the estimated value Yi is smaller than the threshold value, the primary user does not exist.
CN202010586269.8A 2020-06-24 2020-06-24 Distributed spectrum cooperation detection method Active CN111770499B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010586269.8A CN111770499B (en) 2020-06-24 2020-06-24 Distributed spectrum cooperation detection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010586269.8A CN111770499B (en) 2020-06-24 2020-06-24 Distributed spectrum cooperation detection method

Publications (2)

Publication Number Publication Date
CN111770499A true CN111770499A (en) 2020-10-13
CN111770499B CN111770499B (en) 2022-04-26

Family

ID=72722469

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010586269.8A Active CN111770499B (en) 2020-06-24 2020-06-24 Distributed spectrum cooperation detection method

Country Status (1)

Country Link
CN (1) CN111770499B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104618908A (en) * 2014-12-31 2015-05-13 重庆邮电大学 Method and device for resisting spectrum sensing data falsification through distributed cognitive radio network
CN104618909A (en) * 2015-01-08 2015-05-13 沈阳航空航天大学 Credibility-based aeronautical radio cooperative spectrum sensing method
CN104993890A (en) * 2015-07-14 2015-10-21 福建师范大学 Security cooperative spectrum sensing method based on reputation mechanism and dynamic game
CN106850583A (en) * 2017-01-06 2017-06-13 南京邮电大学 A kind of distributed collaborative frequency spectrum perception attack defense method based on effectiveness
CN107623554A (en) * 2017-08-24 2018-01-23 西安电子科技大学 A collaborative spectrum sensing method based on trust value, cognitive wireless network
CN109150623A (en) * 2018-09-13 2019-01-04 重庆大学 Malicious user SSDF attack method and system are resisted based on repeating query credit value
CN111193564A (en) * 2019-12-25 2020-05-22 南京工业大学 Broadband Weighted Cooperative Spectrum Sensing Algorithm Against Smart SSDF Attacks

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104618908A (en) * 2014-12-31 2015-05-13 重庆邮电大学 Method and device for resisting spectrum sensing data falsification through distributed cognitive radio network
CN104618909A (en) * 2015-01-08 2015-05-13 沈阳航空航天大学 Credibility-based aeronautical radio cooperative spectrum sensing method
CN104993890A (en) * 2015-07-14 2015-10-21 福建师范大学 Security cooperative spectrum sensing method based on reputation mechanism and dynamic game
CN106850583A (en) * 2017-01-06 2017-06-13 南京邮电大学 A kind of distributed collaborative frequency spectrum perception attack defense method based on effectiveness
CN107623554A (en) * 2017-08-24 2018-01-23 西安电子科技大学 A collaborative spectrum sensing method based on trust value, cognitive wireless network
CN109150623A (en) * 2018-09-13 2019-01-04 重庆大学 Malicious user SSDF attack method and system are resisted based on repeating query credit value
CN111193564A (en) * 2019-12-25 2020-05-22 南京工业大学 Broadband Weighted Cooperative Spectrum Sensing Algorithm Against Smart SSDF Attacks

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
尹娜: "无线传感网中信任安全相关技术研究", 《中国优秀硕士学位论文全文数据库》 *

Also Published As

Publication number Publication date
CN111770499B (en) 2022-04-26

Similar Documents

Publication Publication Date Title
Wu et al. BLTM: Beta and LQI based trust model for wireless sensor networks
Farzaneh et al. An anomaly-based IDS for detecting attacks in RPL-based internet of things
Ghugar et al. LB‐IDS: Securing wireless sensor network using protocol layer trust‐based intrusion detection system
Gu et al. Support vector machine (svm) based sybil attack detection in vehicular networks
CN103957525A (en) Malicious node detection method based on clustering trust evaluation in internet of vehicles
Rmayti et al. A stochastic approach for packet dropping attacks detection in mobile Ad hoc networks
Bhuiyan et al. Collusion attack detection in networked systems
CN108040325B (en) Sybil node detection method based on RSSI value and credit degree
Banerjee et al. Fault tolerant multiple event detection in a wireless sensor network
Gu et al. k-Nearest Neighbours classification based Sybil attack detection in Vehicular networks
Khan et al. A temperature-aware trusted routing scheme for sensor networks: Security approach
CN106850583B (en) A Utility-Based Distributed Cooperative Spectrum Sensing Attack Defense Method
Su et al. Trusted opportunistic routing based on node trust model
Wang et al. Local detection of selfish routing behavior in ad hoc networks
Singh et al. FCTM: A Novel Fuzzy Classification Trust Model for Enhancing Reliability in Flying Ad Hoc Networks (FANETs).
CN111770499B (en) Distributed spectrum cooperation detection method
Thanuja et al. Unethical network attack detection and prevention using fuzzy based decision system in mobile ad-hoc networks
Alenezi et al. SWANS: SDN-based Wormhole Analysis using the Neighbor Similarity for a Mobile ad hoc network (MANET)
Yang et al. DS evidence theory based trust detection scheme in wireless sensor networks
Cucurull et al. Surviving attacks in challenged networks
Gao et al. Sensor selection based on dempster-shafer evidence theory under collaborative spectrum sensing in cognitive radio sensor networks
CN113194063B (en) A real-time detection method for malicious nodes in the Internet of Things network
Liu et al. A trust-based message passing algorithm against persistent ssdf
Yu et al. Secure continuous aggregation via sampling-based verification in wireless sensor networks
As' adi et al. A new statistical method for wormhole attack detection in MANETs

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant