融入糾錯(cuò)編碼的認(rèn)知無線電物理層安全認(rèn)證研究
發(fā)布時(shí)間:2018-10-17 14:07
【摘要】:認(rèn)知無線電技術(shù),是為了解決無線頻譜資源短缺以及通信標(biāo)準(zhǔn)的多樣化等問題提出的有效方案。在認(rèn)知無線電網(wǎng)絡(luò)系統(tǒng)中,主用戶的優(yōu)先級(jí)別最高,次用戶只有在主用戶未占用信道的空閑時(shí)段可以以某種“機(jī)會(huì)”的方式暫時(shí)取代主用戶利用頻譜空洞在信道中傳輸數(shù)據(jù)。當(dāng)主用戶需要重新使用信道時(shí),次用戶必須馬上撤出,因此攻擊者常常模仿主用戶信號(hào)非法占用信道。為了解決主用戶攻擊的問題,需要在用戶接入信道前對(duì)用戶身份進(jìn)行認(rèn)證。現(xiàn)代無線通信系統(tǒng)中,若在上層通信網(wǎng)絡(luò)中對(duì)信號(hào)進(jìn)行認(rèn)證需要對(duì)信號(hào)進(jìn)行復(fù)雜的解析操作,效率低、速率慢且沒有必要,而物理層認(rèn)證技術(shù)很好的解決了這一問題。它利用Hash函數(shù)的單向性來有效解決主用戶認(rèn)證問題,同時(shí)通過物理層低速率傳輸實(shí)現(xiàn)認(rèn)證的隱藏傳輸,最大限度降低對(duì)合法用戶的干擾,保證通信雙方是其所聲稱的身份,防止非法用戶的接入與訪問。本文主要研究了認(rèn)知無線電物理層安全認(rèn)證中嵌入認(rèn)證標(biāo)簽的兩種方法:寄生調(diào)制方法與寄生糾錯(cuò)編碼方法(ECC)。本論文的主要研究工作和創(chuàng)新如下:(1)首先研究了認(rèn)知無線電物理層安全認(rèn)證中的調(diào)制方案。從信道糾錯(cuò)編碼的角度探討認(rèn)知無線電寄生認(rèn)證信道的容量。通過推導(dǎo)認(rèn)證信道的對(duì)數(shù)似然比,給出了其簡(jiǎn)化計(jì)算方式,分析與仿真結(jié)果表明:簡(jiǎn)化計(jì)算與嚴(yán)格計(jì)算結(jié)果相仿,因而認(rèn)證信道可等效為二元輸入的加性高斯白噪聲(BI-AWGN)信道;(2)在調(diào)制方案中,基于對(duì)數(shù)似然比的簡(jiǎn)化形式,通過置信度傳播迭代譯碼,考察了融入LDPC糾錯(cuò)機(jī)制的認(rèn)證信道實(shí)際傳輸性能。仿真結(jié)果表明:簡(jiǎn)化譯碼的結(jié)果與理想BI-AWGN的譯碼性能無法區(qū)分。研究結(jié)論:認(rèn)知無線電寄生認(rèn)證信道可嚴(yán)格等效為BI-AWGN信道,因而可采用BI-AWGN信道設(shè)計(jì)的糾錯(cuò)編碼來有效逼近寄生認(rèn)證信道的傳輸極限。(3)研究了認(rèn)知無線電物理層安全認(rèn)證中的編碼方案,首先對(duì)認(rèn)證標(biāo)簽進(jìn)行編碼,再嵌入同樣經(jīng)過信道編碼的信息中;并對(duì)比了RS編碼與LDPC編碼兩種編碼方式在不同的信道上傳輸?shù)恼`碼率性能,分析結(jié)果表明:采用LDPC編碼比RS編碼性能更為優(yōu)越。(4)從誤碼率性能與認(rèn)證標(biāo)簽傳輸速率關(guān)系角度出發(fā),分析比較了寄生調(diào)制與寄生編碼這兩種方案性能的優(yōu)劣。本文分析結(jié)果表明:在同等誤碼率與信噪比的條件下,寄生調(diào)制方案標(biāo)簽傳輸所需的時(shí)間要遠(yuǎn)遠(yuǎn)低于寄生編碼方案標(biāo)簽傳輸所需的時(shí)間,由此可以得出寄生調(diào)制方案要優(yōu)于寄生糾錯(cuò)編碼方案的結(jié)論。
[Abstract]:Cognitive radio technology is an effective solution to the shortage of wireless spectrum resources and the diversification of communication standards. In cognitive radio networks, primary users have the highest priority, and secondary users can temporarily replace primary users by using spectral holes to transmit data in the channel only in the idle time when the primary user does not occupy the channel. When the primary user needs to reuse the channel, the secondary user must withdraw immediately, so the attacker often imitates the primary user signal to illegally occupy the channel. In order to solve the problem of primary user attack, it is necessary to authenticate the user's identity before the user accesses the channel. In modern wireless communication system, if the signal is authenticated in the upper layer communication network, the signal needs complex parsing operation, which is inefficient, slow and unnecessary, and the physical layer authentication technology solves this problem very well. It makes use of the unidirectionality of Hash function to solve the problem of primary user authentication effectively. At the same time, it realizes the hidden transmission of authentication through physical layer low rate transmission, reduces the interference to legitimate users to the maximum extent, and ensures that both sides of communication are their claimed identities. Prevent illegal user access and access. This paper mainly studies two methods of embedding authentication tags in physical layer security authentication of cognitive radio: parasitic modulation method and parasitic error correction coding method (ECC). The main work and innovations of this thesis are as follows: (1) the modulation scheme in the physical layer security authentication of cognitive radio is studied firstly. The capacity of parasitic authentication channel of cognitive radio is discussed from the point of view of channel error correction coding. By deducing the logarithmic likelihood ratio of authentication channel, the simplified calculation method is given. The results of analysis and simulation show that the simplified calculation is similar to the rigorous calculation. Therefore, the authentication channel can be equivalent to an additive Gao Si white noise (BI-AWGN) channel with binary input. (2) in the modulation scheme, iterative decoding is propagated by confidence based on the simplified form of log-likelihood ratio. The actual transmission performance of authentication channel with LDPC error correction mechanism is investigated. The simulation results show that the simplified decoding results can not be distinguished from the decoding performance of ideal BI-AWGN. Conclusion: the parasitic authentication channel of cognitive radio can be strictly equivalent to BI-AWGN channel. Therefore, the error-correcting coding designed by BI-AWGN channel can be used to effectively approximate the transmission limit of parasitic authentication channel. (3) the coding scheme in the physical layer of cognitive radio authentication is studied. Firstly, the authentication label is coded. Then we embed the same channel coded information, and compared the BER performance of RS coding and LDPC coding on different channels. The analysis results show that the performance of LDPC coding is better than that of RS coding. (4) the performance of parasitic modulation scheme and parasitic coding scheme are analyzed and compared from the point of view of the relationship between bit error rate (BER) performance and the transmission rate of authentication tag. The results show that under the same BER and SNR, the time required for tag transmission of parasitic modulation scheme is much lower than that for tag transmission in parasitic coding scheme. It is concluded that the parasitic modulation scheme is superior to the parasitic error correction coding scheme.
【學(xué)位授予單位】:南京郵電大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2017
【分類號(hào)】:TN925
本文編號(hào):2276912
[Abstract]:Cognitive radio technology is an effective solution to the shortage of wireless spectrum resources and the diversification of communication standards. In cognitive radio networks, primary users have the highest priority, and secondary users can temporarily replace primary users by using spectral holes to transmit data in the channel only in the idle time when the primary user does not occupy the channel. When the primary user needs to reuse the channel, the secondary user must withdraw immediately, so the attacker often imitates the primary user signal to illegally occupy the channel. In order to solve the problem of primary user attack, it is necessary to authenticate the user's identity before the user accesses the channel. In modern wireless communication system, if the signal is authenticated in the upper layer communication network, the signal needs complex parsing operation, which is inefficient, slow and unnecessary, and the physical layer authentication technology solves this problem very well. It makes use of the unidirectionality of Hash function to solve the problem of primary user authentication effectively. At the same time, it realizes the hidden transmission of authentication through physical layer low rate transmission, reduces the interference to legitimate users to the maximum extent, and ensures that both sides of communication are their claimed identities. Prevent illegal user access and access. This paper mainly studies two methods of embedding authentication tags in physical layer security authentication of cognitive radio: parasitic modulation method and parasitic error correction coding method (ECC). The main work and innovations of this thesis are as follows: (1) the modulation scheme in the physical layer security authentication of cognitive radio is studied firstly. The capacity of parasitic authentication channel of cognitive radio is discussed from the point of view of channel error correction coding. By deducing the logarithmic likelihood ratio of authentication channel, the simplified calculation method is given. The results of analysis and simulation show that the simplified calculation is similar to the rigorous calculation. Therefore, the authentication channel can be equivalent to an additive Gao Si white noise (BI-AWGN) channel with binary input. (2) in the modulation scheme, iterative decoding is propagated by confidence based on the simplified form of log-likelihood ratio. The actual transmission performance of authentication channel with LDPC error correction mechanism is investigated. The simulation results show that the simplified decoding results can not be distinguished from the decoding performance of ideal BI-AWGN. Conclusion: the parasitic authentication channel of cognitive radio can be strictly equivalent to BI-AWGN channel. Therefore, the error-correcting coding designed by BI-AWGN channel can be used to effectively approximate the transmission limit of parasitic authentication channel. (3) the coding scheme in the physical layer of cognitive radio authentication is studied. Firstly, the authentication label is coded. Then we embed the same channel coded information, and compared the BER performance of RS coding and LDPC coding on different channels. The analysis results show that the performance of LDPC coding is better than that of RS coding. (4) the performance of parasitic modulation scheme and parasitic coding scheme are analyzed and compared from the point of view of the relationship between bit error rate (BER) performance and the transmission rate of authentication tag. The results show that under the same BER and SNR, the time required for tag transmission of parasitic modulation scheme is much lower than that for tag transmission in parasitic coding scheme. It is concluded that the parasitic modulation scheme is superior to the parasitic error correction coding scheme.
【學(xué)位授予單位】:南京郵電大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2017
【分類號(hào)】:TN925
【參考文獻(xiàn)】
相關(guān)期刊論文 前1條
1 王麗娜;李超;周賢偉;;認(rèn)知無線電的合作頻譜檢測(cè)分析[J];電訊技術(shù);2008年07期
相關(guān)碩士學(xué)位論文 前1條
1 李紅寧;認(rèn)知無線電安全性研究[D];西安電子科技大學(xué);2010年
,本文編號(hào):2276912
本文鏈接:http://www.sikaile.net/kejilunwen/xinxigongchenglunwen/2276912.html
最近更新
教材專著