首页> 外文期刊>Wireless Communications, IEEE Transactions on >Surveillance Strategies Against Primary User Emulation Attack in Cognitive Radio Networks
【24h】

Surveillance Strategies Against Primary User Emulation Attack in Cognitive Radio Networks

机译:认知无线电网络中针对主要用户仿真攻击的监视策略

获取原文
获取原文并翻译 | 示例
获取外文期刊封面目录资料

摘要

We investigate the primary user emulation (PUE) attack, which is a serious security problem in cognitive radio (CR) networks. There exist three types of PUE attackers: 1) a selfish one, which aims at maximizing its selfish usage of channel resource; 2) a malicious one, which points for obstructing the operation of CR network; and 3) a mixed one, which is between a selfish and malicious PUE attacker. For combating a selfish PUE attacker, a channel surveillance process has to be implemented in order to determine active user's identification and so selfish PUE attacker. An extra-sensing process has to be implemented for observing new opportunities to access the channel and so for mitigating the malicious PUE attacker's effect. Relevant strategies for deploying the above processes are obtained through a game theory-based analysis and the exhibition of Nash equilibrium (NE). We show the NE strongly depends on the network demand, the availability of the spectrum resource, and the type of the attacker.
机译:我们调查主要用户仿真(PUE)攻击,这是认知无线电(CR)网络中的一个严重的安全问题。 PUE攻击者有三种类型:1)自私的,旨在最大程度地利用自私使用信道资源; 2)恶意的,它会阻碍CR网络的运行; (3)介于自私和恶意PUE攻击者之间的混合攻击。为了与自私的PUE攻击者作斗争,必须实施信道监视过程,以便确定活动用户的身份,从而确定自私的PUE攻击者。必须执行额外的感知过程,以观察访问该信道的新机会,从而减轻恶意PUE攻击者的影响。通过基于博弈论的分析和纳什均衡(NE)的展示,可以获得部署上述过程的相关策略。我们证明了网元在很大程度上取决于网络需求,频谱资源的可用性以及攻击者的类型。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号