天堂国产午夜亚洲专区-少妇人妻综合久久蜜臀-国产成人户外露出视频在线-国产91传媒一区二区三区

面向認知網(wǎng)絡(luò)的異常協(xié)作節(jié)點評估方法研究

發(fā)布時間:2019-03-19 10:58
【摘要】:隨著無線技術(shù)的迅猛發(fā)展,用戶需求不斷增長,無線頻譜越發(fā)緊張,面臨著嚴重匱乏的問題。認知無線網(wǎng)絡(luò)的出現(xiàn)為解決頻譜資源不足,提高頻譜資源利用率,提供了重要思路,已成為近年來廣泛研究的熱點。它通過動態(tài)的感知周圍環(huán)境信息,并對其進行學習和分析,然后根據(jù)當前狀況進行相應(yīng)的規(guī)劃和決策,從而實現(xiàn)對頻譜資源的“二次利用”。然而由于其開放共享的通信資源環(huán)境,使其比起傳統(tǒng)無線網(wǎng)絡(luò),更易受到安全攻擊,特別是來自惡意實體和自私實體的干擾及攻擊,將破壞感知數(shù)據(jù)的可信性,威脅可信認知能力,影響認知決策和頻譜分配的公平性。傳統(tǒng)的網(wǎng)絡(luò)加解密、身份驗證等防御技術(shù),無法有效的解決這些內(nèi)部安全威脅,而信譽機制作為傳統(tǒng)安全方案的補充,能夠有效的解決網(wǎng)絡(luò)內(nèi)部的安全問題。因此本文借鑒信譽理論,結(jié)合認知無線網(wǎng)絡(luò)自身特征,從整個認知過程出發(fā),針對惡意實體和自私實體,提出一個面向認知網(wǎng)絡(luò)的異常協(xié)作節(jié)點評估機制,通過該機制去監(jiān)督和評估網(wǎng)絡(luò)中各實體行為,及時發(fā)現(xiàn)并處理網(wǎng)絡(luò)中的惡意和自私實體,從而增強實體合作性,為可靠的頻譜接入及網(wǎng)絡(luò)安全性能提供保障。本文主要工作如下:(1)首先分析當前認知無線網(wǎng)絡(luò)中存在的安全威脅,梳理了認知無線網(wǎng)絡(luò)安全機制的研究脈絡(luò),分析了在認知無線網(wǎng)絡(luò)中引入信譽機制的背景和動機。(2)在現(xiàn)有的集中式網(wǎng)絡(luò)拓撲基礎(chǔ)上,針對認知無線網(wǎng)絡(luò)自身特點,提出基于位置分簇的認知無線網(wǎng)絡(luò),考慮到位置因素對認知用戶感知特性的影響,彌補了認知網(wǎng)絡(luò)中拓撲控制方面研究的空白,為信譽評估機制的提出打下模型基礎(chǔ)。(3)針對現(xiàn)有方法孤立研究各協(xié)議層威脅,缺乏對整個認知過程的考量,以及沒有將信譽與認知能力相結(jié)合來提高網(wǎng)絡(luò)安全等缺點。本文在基于位置分簇的網(wǎng)絡(luò)拓撲基礎(chǔ)上,建立了基于認知環(huán)的信譽評估機制,通過對節(jié)點信譽狀態(tài)的評估,去發(fā)現(xiàn)異常實體,并通過獎懲機制對其進行處理,以提高認知能力的可靠性,保障頻譜接入的公平性。(4)通過仿真分析,驗證了所提機制對評估和抵御惡意實體及自私實體的有效性及優(yōu)越性。
[Abstract]:With the rapid development of wireless technology, the demand of users is increasing, and the wireless spectrum is becoming more and more tense, which is facing the problem of serious shortage. The emergence of cognitive wireless network provides an important way to solve the shortage of spectrum resources and improve the efficiency of spectrum resources, and has become a hot topic in recent years. It realizes the "secondary utilization" of spectrum resources by dynamically perceiving the surrounding environment information, learning and analyzing it, and then making corresponding planning and decision-making according to the current situation. However, because of its open and shared communication resource environment, it is more vulnerable to security attacks than traditional wireless networks, especially interference and attacks from malicious entities and selfish entities, which will undermine the credibility of perceptual data. Threat to credible cognitive ability affects the fairness of cognitive decision-making and spectrum allocation. Traditional network encryption and decryption, authentication and other defense techniques can not effectively solve these internal security threats, and reputation mechanism, as the supplement of traditional security schemes, can effectively solve the internal security problems of the network. Therefore, referring to the reputation theory and combining the characteristics of cognitive wireless network, this paper proposes an abnormal cooperative node evaluation mechanism for cognitive networks, aiming at malicious entities and selfish entities, and starting from the whole cognitive process, this paper proposes an abnormal cooperative node evaluation mechanism for cognitive networks. Through this mechanism, we can monitor and evaluate the behavior of entities in the network, detect and deal with the malicious and selfish entities in the network in time, so as to enhance the cooperation of entities and provide the guarantee for reliable spectrum access and network security. The main work of this paper is as follows: (1) at first, the security threats in cognitive wireless network are analyzed, and the research context of cognitive wireless network security mechanism is combed. This paper analyzes the background and motivation of introducing reputation mechanism into cognitive wireless networks. (2) based on the existing centralized network topology, a location-based clustering cognitive wireless network is proposed according to the characteristics of cognitive wireless networks. Considering the influence of location factors on cognitive user perception, it makes up for the gaps in topology control research in cognitive networks, and lays a model foundation for the establishment of reputation assessment mechanism. (3) the threat of each protocol layer is studied in isolation according to the existing methods. Lack of consideration of the whole cognitive process, and lack of credit and cognitive ability to improve network security and other shortcomings. In this paper, based on the network topology based on location clustering, a reputation evaluation mechanism based on cognitive ring is established. By evaluating the reputation status of nodes, abnormal entities are found and processed by reward and punishment mechanism. In order to improve the reliability of cognitive ability and ensure the fairness of spectrum access. (4) the validity and superiority of the proposed mechanism for evaluating and resisting malicious entities and selfish entities are verified by simulation analysis.
【學位授予單位】:哈爾濱工程大學
【學位級別】:碩士
【學位授予年份】:2014
【分類號】:TN925

【參考文獻】

相關(guān)期刊論文 前10條

1 張峻源;張彥旭;;認知無線電中基于位置信息的分簇協(xié)作檢測算法[J];電子世界;2012年23期

2 王健;劉衍珩;張婧;劉雪蓮;;移動自組網(wǎng)的主觀信任建模與仿真[J];電子學報;2011年12期

3 魏急波;王杉;趙海濤;;認知無線網(wǎng)絡(luò):關(guān)鍵技術(shù)與研究現(xiàn)狀[J];通信學報;2011年11期

4 劉全;高俊;郭云瑋;劉思洋;;抗SSDF攻擊的一致性協(xié)作頻譜感知方案[J];電子學報;2011年11期

5 許建霞;劉會衡;劉克中;;基于能量檢測的頻譜感知技術(shù)研究與仿真[J];武漢理工大學學報(交通科學與工程版);2011年03期

6 李勇軍;代亞非;;對等網(wǎng)絡(luò)信任機制研究[J];計算機學報;2010年03期

7 應(yīng)小凡;;認知無線電通信系統(tǒng)關(guān)鍵技術(shù)研究[J];通信技術(shù);2010年03期

8 滑楠;曹志剛;;無線認知網(wǎng)絡(luò)概念與實例研究[J];計算機工程與應(yīng)用;2009年02期

9 周賢偉;辛曉瑜;王麗娜;薛楠;;認知無線電安全關(guān)鍵技術(shù)研究[J];電信科學;2008年02期

10 張學;陸桑璐;陳貴海;陳道蓄;謝立;;無線傳感器網(wǎng)絡(luò)的拓撲控制[J];軟件學報;2007年04期

相關(guān)博士學位論文 前2條

1 楊磊;認知無線電系統(tǒng)中若干關(guān)鍵技術(shù)的研究[D];大連理工大學;2012年

2 賀鵬;移動Ad Hoc網(wǎng)絡(luò)中路由與拓撲控制技術(shù)的研究[D];西安電子科技大學;2007年

,

本文編號:2443458

資料下載
論文發(fā)表

本文鏈接:http://www.sikaile.net/kejilunwen/wltx/2443458.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權(quán)申明:資料由用戶f50af***提供,本站僅收錄摘要或目錄,作者需要刪除請E-mail郵箱bigeng88@qq.com