...
首页> 外文期刊>Iranian Journal of Science and Technology, Transactions of Electrical Engineering >Trust Establishment in Chaotic Cognitive Environment to Improve Attack Detection Accuracy Under Primary User Emulation
【24h】

Trust Establishment in Chaotic Cognitive Environment to Improve Attack Detection Accuracy Under Primary User Emulation

机译:混沌认知环境下的信任建立,可提高主用户仿真下攻击检测的准确性

获取原文
获取原文并翻译 | 示例
           

摘要

In this paper, we propose a novel algorithm for primary user emulation attack detection and removal in cognitive radio networks, which are driven by chaotic tag-based sequencing for communication. Our proposed approach demonstrates the use of the look-up table-based challenge sequences which are monitored by the cognitive base station and act as the first line of defense against any primary user emulation attacker. This ensures that almost all of the attackers are suppressed, and for the remaining attackers if any, we use a tag-based chaotic communication system, wherein each of the requests from secondary users is sent like a chaotic noise sequence on the channel, and the receiving entity decodes this sequence in order to get the signal communicated by an authorized transmitter. If there is any communication by an attacker, then it is detected immediately, as none of the receiving entities can decode the signals sent by these unwanted attacker nodes. This ensures that our system guarantees greater than 99% detection and identification of attackers in primary user emulation attacks.
机译:在本文中,我们提出了一种新的算法,用于认知无线电网络中主要用户仿真攻击的检测和消除,该算法由基于混沌标签的排序驱动。我们提出的方法演示了基于查询表的质询序列的使用,质询表由认知基站进行监视,并充当针对任何主要用户仿真攻击者的第一道防线。这样可以确保几乎所有攻击者都受到抑制,对于其余攻击者(如果有),我们使用基于标签的混沌通信系统,其中,次要用户的每个请求都像信道上的混沌噪声序列一样被发送,并且接收实体对该序列进行解码,以便获得授权发射机发送的信号。如果攻击者进行了任何通信,则将立即检测到该通信,因为没有接收实体可以解码这些不需要的攻击者节点发送的信号。这可以确保我们的系统保证在主要用户模拟攻击中检测和识别超过99%的攻击者。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号