Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Malicious user identification method based on som neural network in cognitive radio

A cognitive radio and neural network technology, applied in network planning, wireless communication, electrical components, etc., can solve problems such as data loss and the impact on the accuracy of judgment results, and achieve the effect of broad development space

Active Publication Date: 2019-10-11
SOUTHEAST UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In comparison, the physical realization of the hard decision system is higher, but the quantization process leads to a certain degree of data loss, which has a certain impact on the accuracy of the decision result

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious user identification method based on som neural network in cognitive radio
  • Malicious user identification method based on som neural network in cognitive radio
  • Malicious user identification method based on som neural network in cognitive radio

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] Below in conjunction with specific embodiment, further set forth the present invention, should be understood that these embodiments are only used to illustrate the present invention and are not intended to limit the scope of the present invention, after having read the present invention, those skilled in the art will understand various equivalent forms of the present invention The modifications all fall within the scope defined by the requirements of this application.

[0039] figure 1 A central cooperative spectrum sensing model is shown, which includes a primary user, a fusion center and J secondary users, and these secondary users include several malicious users. In this model, the secondary users are independent from each other, and all local sensing signals are sent to the fusion center for decision simultaneously. Assume that each secondary user samples N times and adopts energy detection. Taking the jth user as an example, the statistics of its energy value can...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a malicious user discrimination method based on a self-organizing map neural network in a cognitive radio. The invention uses a self-organizing map (referred to as SOM) neural network to learn the distribution characteristics of an input energy matrix, and calculates the input amount according to the learning result. effective classification. First, the concept of "suspiciousness" is introduced, and its size is allocated according to the number of secondary users contained in each category after each training. In order to eliminate the defects of the traditional SOM neural network, the present invention further proposes the concept of "average suspiciousness". The specific steps include: obtaining the energy matrix, using the SOM neural network algorithm to train the energy matrix to obtain the classification matrix, calculating the "suspiciousness" of each secondary user, constructing the index matrix and repeating the training process, and calculating the "suspicious degree" obtained each time degree", that is, the "average suspicious degree", and use the "average suspicious degree" to classify secondary users to identify malicious users or normal users.

Description

technical field [0001] The invention relates to a technology for responding to malicious attacks based on self-organizing map neural networks, and belongs to the field of cognitive radio technology. Background technique [0002] The rapid development of wireless communication technology has directly led to the scarcity of spectrum resources. In order to solve this problem, collaborative spectrum sensing came into being. A common centric cooperative spectrum sensing model includes a primary user, a fusion center and multiple secondary users. When the primary user is idle, the secondary user is allowed to access the primary user. The specific process of perception is: [0003] (1) After completing the detection, all secondary users send reports to the fusion center for judgment. [0004] (2) The fusion center fuses the received data and compares the fusion result with the threshold value. If the fusion result is greater than the threshold value, the judgment result is that...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/00H04W16/14H04W12/122
CPCY02D30/70
Inventor 胡静宋铁成程之序夏玮玮燕锋沈连丰胡亚洲
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products