Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for resisting simulated main customer attack in cognitive radio

A cognitive radio, primary user technology, applied in wireless communication, electrical components, connection management, etc., can solve problems such as negative network impact

Inactive Publication Date: 2009-04-29
UNIV OF SCI & TECH BEIJING
View PDF0 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Cooperative detection with the introduction of cooperative diversity techniques can lead to more accurate perceptual performance, but has a negative impact on resource-constrained networks, and it is studied assuming that the location of the primary user is known

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for resisting simulated main customer attack in cognitive radio
  • Method for resisting simulated main customer attack in cognitive radio
  • Method for resisting simulated main customer attack in cognitive radio

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] The realization of the present invention's anti-imitation master user attack, as attached figure 1 As shown, consider a cognitive radio system consisting of M primary users and N cognitive users, each cognitive user can perform spectrum sensing independently, and consider that cognitive user terminals can continuously sense the surrounding radio environment and receive Transient signals generated at the moment of power-on of each radio station. Cognitive users use an array antenna with the number of array elements p, and the number of mixed signals perceived by a cognitive user at a certain moment includes primary user signals and non-primary user signals is tentatively set to q (due to the uncertainty of the primary user q is a random number). The signal source identification method realized by the present invention is divided into the following steps:

[0055] Step 1: Perform noise reduction processing on the mixed signal received in the spectrum sensing process.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for resisting primary user impersonation attacks in cognitive radio belongs to the technical field of radio communication, particularly relates to sensing and processing of the signals in the cognitive radio system and identification of a signal source. The method comprises the following steps: reducing noise of a composite signal which is received during a spectrum sensing process, estimating number of the signal sources in the composite signal, and reconstructing various signals by a Capon beamformer; separating the signals of different radios, focusing the signals of different radios to separate out a transient signal and a modulation signal, analyzing the transient signal by wavelet transformation; extracting characteristic parameters and realizing identification of the signal source. The method for resisting the primary user impersonation attacks helps realize effective identification of the signal source and effectively resist the primary user impersonation attacks; and the method has a wide application scope, does not change a working mode of the existing primary user network, and satisfies operation requirements of FCC for a cognitive network.

Description

technical field [0001] The invention relates to a method for resisting imitation primary user attack in cognitive radio, which belongs to the field of wireless communication technology, and particularly relates to the perception and processing of signals in cognitive radio systems, and the identification of signal source identities. Background technique [0002] As an intelligent wireless communication system, a cognitive radio network can perceive and learn the surrounding environment, and adjust its own communication parameters to adapt to changes in the surrounding environment. On the basis of not affecting the normal communication of licensed users, cognitive users can dynamically use idle licensed frequency bands in an "opportunistic way", which can well solve the problem of current spectrum resource shortage. [0003] Cognitive users have the ability to transmit on various frequencies in most frequency bands and can use multiple communication channels in the same netwo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W74/04H04W76/02H04W12/08H04W12/06H04W12/122
Inventor 周贤伟杜利平王建萍李丹杨桢王超
Owner UNIV OF SCI & TECH BEIJING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products