上海交通大学学报(英文版) ›› 2011, Vol. 16 ›› Issue (6): 641-647.doi: 10.1007/s12204-011-1204-6
• 论文 • 下一篇
ZHAO Shi-kang (赵士康), HE Di (何 迪), LI Wen-hua (李文化), ZHU Fu-sheng (朱伏生)
收稿日期:
2011-01-24
出版日期:
2011-12-30
发布日期:
2012-01-12
通讯作者:
ZHAO Shi-kang (赵士康)
E-mail:zhaoshikang512@163.com
ZHAO Shi-kang (赵士康), HE Di (何 迪), LI Wen-hua (李文化), ZHU Fu-sheng (朱伏生)
Received:
2011-01-24
Online:
2011-12-30
Published:
2012-01-12
Contact:
ZHAO Shi-kang (赵士康)
E-mail:zhaoshikang512@163.com
摘要: Collaborative spectrum sensing is
proposed to improve the detection performance in cognitive radio
(CR) networks. However, most of the current collaborative sensing
schemes are vulnerable to the interference of the malicious
secondary users (SUs). In this paper we propose a reputation-based
collaborative spectrum sensing scheme to improve the security of
cooperative sensing by mitigating the impacts of misbehaviors. The
fusion center calculates the reputation rating of each SU according
to their history reports to weight their sensing results in the
proposed scheme. We analyze and evaluate the performance of the
proposed scheme and its advantages over previous schemes in
expansibility and integrity. Simulation results show that the
proposed scheme can minimize the harmful influence from malicious
SUs.
中图分类号:
ZHAO Shi-kang (赵士康), HE Di (何 迪), LI Wen-hua (李文化), ZHU Fu-sheng (朱伏生). Reputation-Based Collaborative Spectrum Sensing Scheme in Cognitive Radio Networks[J]. 上海交通大学学报(英文版), 2011, 16(6): 641-647.
ZHAO Shi-kang (赵士康), HE Di (何 迪), LI Wen-hua (李文化), ZHU Fu-sheng (朱伏生). Reputation-Based Collaborative Spectrum Sensing Scheme in Cognitive Radio Networks[J]. Journal of shanghai Jiaotong University (Science), 2011, 16(6): 641-647.
1 FCC Spectrum Efficiency Working Group. Report of the spectrum efficiency working group [EB/OL]. (2011-01-20) [2002-11-15]. http://www.fcc.gov/ sptf/ reports.html. 2 Haykin S. Cognitive radio: Brain-empowered wireless communications [J]. IEEE Journal on Selected Areas in Communications, 2005, 23 (2): 201-220. 3 Sahai A, Hoven N, Tandra R. Some fundamental limits on cognitive radio [C]// Proceedings of Allerton Conference on Communication, Control and Computing. Piscataway, NJ: IEEE, 2004: 131-136. 4 Ghasemi A, Sousa E S. Collaborative spectrum sensing for opportunistic access in fading environments [C]// First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks. Piscataway, NJ: IEEE, 2005: 131-136. 5 Sun C, Zhang W, Letaief K B. Cluster-based cooperative spectrum sensing in cognitive radio systems [C]// IEEE International Conference on Communications. Piscataway, NJ: IEEE, 2007: 2511-2515. 6 Chen R, Park J M, Bian R. Robust distributed spectrum sensing in cognitive radio networks [C]// INFOCOM, the 27th Conference on Computer Communications IEEE. Piscataway, NJ: IEEE, 2008: 1876-1884. 7 Mishra S M, Sahai A, Brodersen R W. Cooperative sensing among cognitive radios [C]// ICC'06. IEEE International Conference. Piscataway, NJ: IEEE, 2006: 1658-1663. 8 Xu S, Shang Y, Wang H. Double thresholds based cooperative spectrum sensing against untrusted secondary users in cognitive radio networks [C]// Vehicular Technology Conference IEEE 69th.Piscataway, NJ: IEEE, 2009: 1-5. 9 Kaligineedi P, Khabbazian M, Bhargava V K. Secure cooperative sensing techniques for cognitive radio systems [C]// ICC'08. IEEE International Conference. Piscataway, NJ: IEEE, 2008: 3406-3410. 10 Hu F, Wang S, Cheng Z. Secure cooperative spectrum sensing for cognitive radio networks [C]// Military Communications Conference MILCOM. Piscataway, NJ: IEEE, 2009: 1-7. 11 Gao F, Yuan W, Liu W, et al. A robust and efficient cooperative spectrum sensing scheme in cognitive radio networks [C]// Communications Workshops (ICC), 2010 IEEE International Conference. Piscataway, NJ: IEEE, 2010: 1-5. 12 Chen H, Jin X, Xie L . Reputation-based collaborative spectrum sensing algorithm in cognitive radio networks [C]// Personal, Indoor and Mobile Radio Communications, 2009 IEEE 20th International Symposium . Piscataway, NJ: IEEE, 2009: 582-587. 13 Zhao T, Zhao Y . A new cooperative detection technique with malicious user suppression [C]// ICC'09. IEEE International Conference. Piscataway, NJ: IEEE, 2009: 1-5. 14 Ma J, Li Y . Soft combination and detection for cooperative spectrum sensing in cognitive radio networks [C]// Global Telecommunications Conference, GLOBECOM. Piscataway, NJ: IEEE, 2007: 3139-3143. |
[1] | WANG Mingzheng, WANG Yijie, WANG Tianyu, HOU Linzao, LI Mian . New Approach for Information Security Evaluation and Management of IT Systems in Educational Institutions[J]. J Shanghai Jiaotong Univ Sci, 2020, 25(6): 689-699. |
[2] | ZHANG Yin-fa1 (张引发), REN Shuai1* (任 帅), LI Juan1 (李 娟), LIAO Xiao-min1 (廖晓闽),LI . Research on High Power Inter-Channel Crosstalk Attack in Optical Networks[J]. 上海交通大学学报(英文版), 2015, 20(1): 7-13. |
[3] | WANG Chih-hung* (王智弘), TU Tai-yuan (涂泰源). Keyword Search Encryption Scheme Resistant Against Keyword-Guessing Attack by the Untrusted Server[J]. 上海交通大学学报(英文版), 2014, 19(4): 440-442. |
[4] | XIE Qi* (谢 琪), LIU Wen-hao (刘文浩), WANG Sheng-bao (王圣宝),HU Bin (胡 斌), DONG Na (董 . Robust Password and Smart Card Based Authentication Scheme with Smart Card Revocation[J]. 上海交通大学学报(英文版), 2014, 19(4): 418-424. |
[5] | HE Jun* (何俊), ZHENG Shi-hui (郑世慧). Intrusion Detection Model with Twin Support Vector Machines[J]. 上海交通大学学报(英文版), 2014, 19(4): 448-454. |
[6] | GAO Jian-bo1 (高建波), ZHANG Bao-wen1* (张保稳), CHEN Xiao-hua2 (陈晓桦), LUO Zheng3 (罗 铮. Ontology-Based Model of Network and Computer Attacks for Security Assessment[J]. 上海交通大学学报(英文版), 2013, 18(5): 554-562. |
[7] | SUN Jin (孙 瑾), HU Yu-pu (胡予濮), ZHANG Le-you (张乐友). Chosen Ciphertext Secure Identity-Based Broadcast Encryption in the Standard Model[J]. 上海交通大学学报(英文版), 2011, 16(6): 672-676. |
[8] | LO Nai-wei (罗乃维), YEH Kuo-hui (叶国晖). Simple Three-Party Password Authenticated Key Exchange Protocol[J]. 上海交通大学学报(英文版), 2011, 16(5): 600-603. |
阅读次数 | ||||||||||||||||||||||||||||||||||||||||||||||||||
全文 572
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||
摘要 2549
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||