Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Self-organization mapping (SOM) neural network-based malicious user discrimination method in cognitive radio

A cognitive radio and neural network technology, applied in network planning, wireless communication, electrical components, etc., can solve problems such as data loss and the impact on the accuracy of judgment results, and achieve the effect of broad development space

Active Publication Date: 2018-01-16
SOUTHEAST UNIV
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In comparison, the physical realization of the hard decision system is higher, but the quantization process leads to a certain degree of data loss, which has a certain impact on the accuracy of the decision result

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Self-organization mapping (SOM) neural network-based malicious user discrimination method in cognitive radio
  • Self-organization mapping (SOM) neural network-based malicious user discrimination method in cognitive radio
  • Self-organization mapping (SOM) neural network-based malicious user discrimination method in cognitive radio

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] Below in conjunction with specific embodiment, further set forth the present invention, should be understood that these embodiments are only used to illustrate the present invention and are not intended to limit the scope of the present invention, after having read the present invention, those skilled in the art will understand various equivalent forms of the present invention The modifications all fall within the scope defined by the requirements of this application.

[0039] figure 1 A central cooperative spectrum sensing model is shown, which includes a primary user, a fusion center and J secondary users, and these secondary users include several malicious users. In this model, the secondary users are independent from each other, and all local sensing signals are sent to the fusion center for decision simultaneously. Assume that each secondary user samples N times and adopts energy detection. Taking the jth user as an example, the statistics of its energy value can...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses an SOM neural network-based malicious user discrimination method in cognitive radio. The method of the present invention utilizes an SOM neural network to learn the distribution characteristics of an input energy matrix, effectively classifies the input according to the learning results, and comprises the step of firstly introducing a suspicious degree concept, wherein the suspicious degree is distributed according to the number of the secondary users of each type after every time training. In order to eliminate the defects of the conventional SOM neural network, the present invention further provides an average suspicious degree concept. The concrete steps comprise obtaining an energy matrix, utilizing an SOM neural network algorithm to train the energy matrix to obtain a classification matrix, calculating the suspicious degree of each secondary user, constructing an index matrix and repeating the training process, averaging the suspicious degrees obtained at each time, namely obtaining the average suspicious degree, utilizing the average suspicious degree to classify the secondary users, and identifying the malicious users or the normal users.

Description

technical field [0001] The invention relates to a technology for responding to malicious attacks based on self-organizing map neural networks, and belongs to the field of cognitive radio technology. Background technique [0002] The rapid development of wireless communication technology has directly led to the scarcity of spectrum resources. In order to solve this problem, collaborative spectrum sensing came into being. A common centric cooperative spectrum sensing model includes a primary user, a fusion center and multiple secondary users. When the primary user is idle, the secondary user is allowed to access the primary user. The specific process of perception is: [0003] (1) After completing the detection, all secondary users send reports to the fusion center for judgment. [0004] (2) The fusion center fuses the received data and compares the fusion result with the threshold value. If the fusion result is greater than the threshold value, the judgment result is that...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/00H04W16/14H04W12/122
CPCY02D30/70
Inventor 胡静宋铁成程之序夏玮玮燕锋沈连丰胡亚洲
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products