認知無線電網(wǎng)絡安全與隱私保護技術(shù)研究
發(fā)布時間:2018-05-27 23:13
本文選題:認知無線電網(wǎng)絡 + 頻譜感知數(shù)據(jù)篡改攻擊; 參考:《西安電子科技大學》2014年博士論文
【摘要】:隨著無線通信技術(shù)的快速發(fā)展,部分頻段越來越擁擠,已無法滿足日益增加的無線用戶的需求。但調(diào)查表明,大部分授權(quán)頻段卻處于空閑狀態(tài)。為了充分利用頻譜資源,為更多的用戶提供服務,認知無線電網(wǎng)絡應運而生。認知無線電網(wǎng)絡在不影響授權(quán)用戶(主用戶)的前提下,為非授權(quán)用戶(認知用戶)提供頻譜接入的機會,具有良好的應用前景。 如何獲取主用戶網(wǎng)絡的空閑頻譜信息并對其合理分配是認知無線電網(wǎng)絡中至關(guān)重要的問題。由于無線環(huán)境的多變性和主用戶信號狀態(tài)的不固定性,準確可靠的頻譜感知成為認知無線電網(wǎng)絡運行的前提和基礎,而惡意節(jié)點的數(shù)據(jù)篡改將會破壞感知數(shù)據(jù)的真實性,從而嚴重影響認知無線電網(wǎng)絡的正常運行;由于空閑頻譜的動態(tài)性和可用信息的公開性,使得攻擊者容易對認知用戶的頻譜感知和接入造成破壞,因此引起的DoS攻擊將會阻礙用戶的頻譜接入,從而最終導致認知用戶無法利用可用頻譜,造成頻譜資源的浪費。此外,在不影響主用戶的前提下,如何使認知用戶之間在互不干擾的條件下,安全使用空閑信道,最大化個人隱私信息保護力度,是認知無線電網(wǎng)絡面臨的巨大挑戰(zhàn)。本文針對上述認知無線電網(wǎng)絡中出現(xiàn)的安全與隱私問題進行研究,所取得的主要研究成果如下: 1.針對分簇式認知無線電網(wǎng)絡頻譜感知過程中的合謀攻擊,提出了一種基于信任機制的分段頻譜感知方案。該方案通過對待感知頻段重新綁定、對認知用戶模數(shù)分組,進行一一映射的頻譜感知,并利用認知用戶信譽值作為數(shù)據(jù)融合的參考,能夠及時發(fā)現(xiàn)惡意用戶,有效阻止合謀攻擊,保證頻譜感知數(shù)據(jù)的可靠性。 2.針對無中心設施下的頻譜感知數(shù)據(jù)篡改攻擊,提出了一種基于鄰居節(jié)點檢測的收斂感知算法。該算法通過認知用戶本地感知,和鄰居節(jié)點交互感知數(shù)據(jù)來達到局部感知數(shù)據(jù)的統(tǒng)一;收斂過程中,可信鄰居節(jié)點集合的更新能夠剔除可疑節(jié)點,提高感知數(shù)據(jù)更新的準確性;且利用鄰居節(jié)點檢測機制,對可信鄰居節(jié)點進行感知數(shù)據(jù)檢測,及時發(fā)現(xiàn)并修正受損的感知數(shù)據(jù),對最終感知結(jié)果進行可靠性判決。 3.針對頻譜分配過程中的追蹤用戶攻擊,提出了一種基于有序集合的抗追蹤用戶攻擊信道選擇方案?紤]到信道申請過程中的信息泄漏,采用認知用戶偏好使用信道集合中對應的序號來代替所選信道,可以有效隱藏所選信道的信息;通過偏好使用信道的同步更新機制,動態(tài)改變偏好信道對應的序號,提高攻擊者獲取所選信道信息的難度。該方案能夠隱藏認知用戶選擇的信道信息,使攻擊者無法追蹤到認知用戶,有效抵抗了追蹤用戶攻擊,保障認知用戶的頻譜接入。 4.針對頻譜分配中由于歷史信道使用信息而造成的位置隱私泄漏問題,提出一種自共存機制下的位置隱私保護信道選擇方案。利用自共存機制為每個基站分配可用頻譜,達到了認知用戶之間無干擾的頻譜共享;通過Hash匹配,使認知用戶在不泄露身份的前提下,獲得頻譜使用權(quán);另外,,采用基站統(tǒng)一注冊的方式,有效防止了認知用戶頻譜使用信息的泄漏。攻擊者即使獲得了數(shù)據(jù)庫中的注冊信息,也無法通過此信息與某個認知用戶聯(lián)系起來。因此,該方案在充分利用頻譜資源的條件下,保護了認知用戶的位置隱私。
[Abstract]:With the rapid development of wireless communication technology, some frequency bands are becoming more and more crowded and can not meet the demand of increasing wireless users. However, the survey shows that most of the authorized bands are idle. In order to make full use of spectrum resources and provide services for more users, it is known that radio networks emerge as the times require. Without affecting the authorized users (primary users), it provides the opportunity for spectrum access for unauthorized users (cognitive users), and has good application prospects.
How to obtain and allocate the free spectrum information of the main user network is the most important problem in the cognitive radio network. Due to the variability of the wireless environment and the unfixed state of the main user signal, the accurate and reliable spectrum sensing is the prerequisite and foundation for the operation of the cognitive radio network, and the data tamper of the malicious nodes is changed. It will disrupt the authenticity of the perceptual data and seriously affect the normal operation of the cognitive radio network. Because of the dynamic performance of the idle spectrum and the openness of the available information, the attacker is prone to damage the spectrum perception and access of the cognitive users. Therefore, the DoS attack will impede the user's spectrum access, thus leading to the final guide. The cognitive users are unable to make use of the available spectrum to cause the waste of spectrum resources. In addition, it is a great challenge to realize the maximum protection of personal privacy information under the condition that the users are not interfered with each other without interfering with the main users. The security and privacy issues in the radio network have been studied. The main research results are as follows:
1. aiming at the conspiracy attack in the spectrum sensing process of cluster cognitive radio networks, a segmented spectrum sensing scheme based on trust mechanism is proposed. By treating the perceptual frequency segment to be re bound, the spectrum perception of the cognitive user module is mapped one by one, and the credit value of the cognitive user is used as the reference of the data fusion. It can detect malicious users in time, effectively prevent collusion attacks, and ensure the reliability of spectrum sensing data.
2. a convergence perception algorithm based on neighbor node detection is proposed for spectrum sensing data tampering attack under the non central facility. The algorithm achieves the unification of local perceptual data through the local perception of the cognitive users and the interaction of the neighbor nodes, and the update of the trusted neighbor node set can be eliminated during the convergence process. By using the neighbor node detection mechanism, we can detect the perceived data of the trusted neighbor nodes, discover and correct the damaged perceived data in time, and make a reliability decision for the final perception results.
3. aiming at the tracking user attack in the spectrum allocation process, an anti tracking user attack channel selection scheme based on the ordered set is proposed. Considering the information leakage in the channel application process, the corresponding serial number of the channel set is used to replace the selected channel, which can effectively hide the information of the selected channel. By using the synchronization update mechanism of the channel, it can dynamically change the sequence number of the preferred channel and improve the difficulty of the attacker to obtain the selected channel information. This scheme can hide the channel information selected by the cognitive users, make the attacker unable to track the cognitive users, effectively resist the tracking user attack, and ensure the spectrum access of the cognitive users.
4. to solve the problem of location privacy leakage caused by the use of historical channel information in the spectrum allocation, a location privacy protection channel selection scheme under the self coexistence mechanism is proposed. Using the self coexistence mechanism to allocate the available spectrum for each base station, achieve the non interference spectrum sharing among the cognitive users, and make the cognitive use by Hash matching. In addition, the unified registration of the base station can effectively prevent the information leakage of the cognitive user spectrum. Even if the attacker has acquired the registration information in the database, the attacker can not connect the information to a certain cognitive user. Therefore, the scheme is fully using frequency. Under the condition of spectrum resources, the location privacy of cognitive users is protected.
【學位授予單位】:西安電子科技大學
【學位級別】:博士
【學位授予年份】:2014
【分類號】:TN925
【參考文獻】
相關(guān)期刊論文 前4條
1 閆琦;楊家瑋;張雯;;認知無線電網(wǎng)絡中安全的合作頻譜感知[J];北京郵電大學學報;2011年02期
2 葛新陽;劉元安;劉凱明;林樂翔;;基于信任的認知無線電安全認證方案[J];保密科學技術(shù);2011年10期
3 羅濤;趙明;李靜葉;樂光新;王小軍;;認知無線電自組織網(wǎng)絡MAC協(xié)議[J];計算機學報;2013年07期
4 裴慶祺;李紅寧;趙弘洋;李男;閔瑩;;認知無線電網(wǎng)絡安全綜述[J];通信學報;2013年01期
本文編號:1944194
本文鏈接:http://www.sikaile.net/kejilunwen/wltx/1944194.html
最近更新
教材專著