上海交通大学学报(英文版) ›› 2011, Vol. 16 ›› Issue (6): 641-647.doi: 10.1007/s12204-011-1204-6
• 论文 • 下一篇
ZHAO Shi-kang (赵士康), HE Di (何 迪), LI Wen-hua (李文化), ZHU Fu-sheng (朱伏生)
收稿日期:
2011-01-24
出版日期:
2011-12-30
发布日期:
2012-01-12
通讯作者:
ZHAO Shi-kang (赵士康)
E-mail:zhaoshikang512@163.com
ZHAO Shi-kang (赵士康), HE Di (何 迪), LI Wen-hua (李文化), ZHU Fu-sheng (朱伏生)
Received:
2011-01-24
Online:
2011-12-30
Published:
2012-01-12
Contact:
ZHAO Shi-kang (赵士康)
E-mail:zhaoshikang512@163.com
摘要: Collaborative spectrum sensing is proposed to improve the detection performance in cognitive radio (CR) networks. However, most of the current collaborative sensing schemes are vulnerable to the interference of the malicious secondary users (SUs). In this paper we propose a reputation-based collaborative spectrum sensing scheme to improve the security of cooperative sensing by mitigating the impacts of misbehaviors. The fusion center calculates the reputation rating of each SU according to their history reports to weight their sensing results in the proposed scheme. We analyze and evaluate the performance of the proposed scheme and its advantages over previous schemes in expansibility and integrity. Simulation results show that the proposed scheme can minimize the harmful influence from malicious SUs.
中图分类号:
ZHAO Shi-kang (赵士康), HE Di (何 迪), LI Wen-hua (李文化), ZHU Fu-sheng (朱伏生). Reputation-Based Collaborative Spectrum Sensing Scheme in Cognitive Radio Networks[J]. 上海交通大学学报(英文版), 2011, 16(6): 641-647.
ZHAO Shi-kang (赵士康), HE Di (何 迪), LI Wen-hua (李文化), ZHU Fu-sheng (朱伏生). Reputation-Based Collaborative Spectrum Sensing Scheme in Cognitive Radio Networks[J]. Journal of shanghai Jiaotong University (Science), 2011, 16(6): 641-647.
1 FCC Spectrum Efficiency Working Group. Report of the spectrumefficiency working group [EB/OL]. (2011-01-20) [2002-11-15].http://www.fcc.gov/ sptf/ reports.html.2 Haykin S. Cognitive radio: Brain-empowered wirelesscommunications [J]. IEEE Journal on Selected Areas inCommunications, 2005, 23 (2): 201-220.3 Sahai A, Hoven N, Tandra R. Some fundamental limits on cognitiveradio [C]// Proceedings of Allerton Conference on Communication,Control and Computing. Piscataway, NJ: IEEE, 2004: 131-136.4 Ghasemi A, Sousa E S. Collaborative spectrum sensing foropportunistic access in fading environments [C]// First IEEEInternational Symposium on New Frontiers in Dynamic Spectrum AccessNetworks. Piscataway, NJ: IEEE, 2005: 131-136.5 Sun C, Zhang W, Letaief K B. Cluster-based cooperative spectrumsensing in cognitive radio systems [C]// IEEE InternationalConference on Communications. Piscataway, NJ: IEEE, 2007:2511-2515.6 Chen R, Park J M, Bian R. Robust distributed spectrum sensing incognitive radio networks [C]// INFOCOM, the 27th Conference onComputer Communications IEEE. Piscataway, NJ: IEEE, 2008:1876-1884.7 Mishra S M, Sahai A, Brodersen R W. Cooperative sensing amongcognitive radios [C]// ICC'06. IEEE International Conference.Piscataway, NJ: IEEE, 2006: 1658-1663.8 Xu S, Shang Y, Wang H. Double thresholds basedcooperative spectrum sensing against untrusted secondary users incognitive radio networks [C]// Vehicular Technology Conference IEEE 69th.Piscataway, NJ: IEEE, 2009: 1-5.9 Kaligineedi P, Khabbazian M, Bhargava V K. Secure cooperativesensing techniques for cognitive radio systems [C]// ICC'08.IEEE International Conference. Piscataway, NJ: IEEE, 2008:3406-3410.10 Hu F, Wang S, Cheng Z. Secure cooperative spectrumsensing for cognitive radio networks [C]// MilitaryCommunications Conference MILCOM. Piscataway, NJ: IEEE, 2009: 1-7.11 Gao F, Yuan W, Liu W, et al. A robust and efficientcooperative spectrum sensing scheme in cognitive radio networks[C]// Communications Workshops (ICC), 2010 IEEE InternationalConference. Piscataway, NJ: IEEE, 2010: 1-5.12 Chen H, Jin X, Xie L . Reputation-based collaborativespectrum sensing algorithm in cognitive radio networks [C]//Personal, Indoor and Mobile Radio Communications, 2009 IEEE 20thInternational Symposium . Piscataway, NJ: IEEE, 2009: 582-587.13 Zhao T, Zhao Y . A new cooperative detection techniquewith malicious user suppression [C]// ICC'09. IEEE InternationalConference. Piscataway, NJ: IEEE, 2009: 1-5.14 Ma J, Li Y . Soft combination and detection for cooperativespectrum sensing in cognitive radio networks [C]// GlobalTelecommunications Conference, GLOBECOM. Piscataway, NJ: IEEE,2007: 3139-3143. |
[1] | WANG Mingzheng, WANG Yijie, WANG Tianyu, HOU Linzao, LI Mian . New Approach for Information Security Evaluation and Management of IT Systems in Educational Institutions[J]. J Shanghai Jiaotong Univ Sci, 2020, 25(6): 689-699. |
[2] | ZHANG Yin-fa1 (张引发), REN Shuai1* (任 帅), LI Juan1 (李 娟), LIAO Xiao-min1 (廖晓闽),LI . Research on High Power Inter-Channel Crosstalk Attack in Optical Networks[J]. 上海交通大学学报(英文版), 2015, 20(1): 7-13. |
[3] | WANG Chih-hung* (王智弘), TU Tai-yuan (涂泰源). Keyword Search Encryption Scheme Resistant Against Keyword-Guessing Attack by the Untrusted Server[J]. 上海交通大学学报(英文版), 2014, 19(4): 440-442. |
[4] | XIE Qi* (谢 琪), LIU Wen-hao (刘文浩), WANG Sheng-bao (王圣宝),HU Bin (胡 斌), DONG Na (董 . Robust Password and Smart Card Based Authentication Scheme with Smart Card Revocation[J]. 上海交通大学学报(英文版), 2014, 19(4): 418-424. |
[5] | HE Jun* (何俊), ZHENG Shi-hui (郑世慧). Intrusion Detection Model with Twin Support Vector Machines[J]. 上海交通大学学报(英文版), 2014, 19(4): 448-454. |
[6] | GAO Jian-bo1 (高建波), ZHANG Bao-wen1* (张保稳), CHEN Xiao-hua2 (陈晓桦), LUO Zheng3 (罗 铮. Ontology-Based Model of Network and Computer Attacks for Security Assessment[J]. 上海交通大学学报(英文版), 2013, 18(5): 554-562. |
[7] | SUN Jin (孙 瑾), HU Yu-pu (胡予濮), ZHANG Le-you (张乐友). Chosen Ciphertext Secure Identity-Based Broadcast Encryption in the Standard Model[J]. 上海交通大学学报(英文版), 2011, 16(6): 672-676. |
[8] | LO Nai-wei (罗乃维), YEH Kuo-hui (叶国晖). Simple Three-Party Password Authenticated Key Exchange Protocol[J]. 上海交通大学学报(英文版), 2011, 16(5): 600-603. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||