计算机科学 ›› 2014, Vol. 41 ›› Issue (5): 8-13.doi: 10.11896/j.issn.1002-137X.2014.05.002

• 综述 • 上一篇    下一篇

认知无线网络的认知能力保障方法研究综述

冯光升,郑晨,王慧强,赵倩,吕宏武   

  1. 哈尔滨工程大学计算机科学与技术学院 哈尔滨150001;哈尔滨工程大学计算机科学与技术学院 哈尔滨150001;哈尔滨工程大学计算机科学与技术学院 哈尔滨150001;哈尔滨商业大学计算机与信息工程学院 哈尔滨150028;哈尔滨工程大学计算机科学与技术学院 哈尔滨150001
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受教育部博士点基金优先发展领域项目(20122304130002),中央高校基本科研业务费(HEUCF100601),黑龙江省博士后基金(LBH-210204),黑龙江省自然科学基金(F201037,ZD201102)资助

Survey towards Cognitive Ability Guarantee in Cognitive Radio Networks

FENG Guang-sheng,ZHENG Chen,WANG Hui-qiang,ZHAO Qian and LV Hong-wu   

  • Online:2018-11-14 Published:2018-11-14

摘要: 认知无线网络通过对无线环境的感知获得频谱空洞信息,并以动态频谱接入为关键技术,机会地使用空闲频谱,与传统的无线网络相比,具有更高的网络通信资源利用率。认知能力作为认知无线网络的本质属性,其安全保障直接关系到认知无线网络的实用化进程。由于网络结构的复杂性、节点的移动性等问题,认知能力在各个认知环节中均面临不同程度的安全威胁。首先从认知循环:认知通信、资源感知、推理决策和服务适配4个环节分析认知能力保障所面临的安全问题以及相应的解决方案,然后总结现有方法的不足和缺陷,提出认知能力保障策略基于信任机制的发展趋势;最后指出未来认知能力保障领域所面临的挑战,并对该领域的研究方向进行了展望。

关键词: 认知无线网络,认知能力,认知通信,资源感知,服务适配

Abstract: Cognitive radio network can sense wireless environment and then uses spectrum white holes in an opportunistic manner through dynamic spectrum access technology.Cognitive ability is an essential attribute of cognitive radio network,therefore the safety guarantee of cognitive ability is directly related to the practical process in cognitive radio networks.Cognitive ability is faced various security threats due to the complexity of cognitive radio network architecture and node mobility issues.Cognitive ability security issues and corresponding solutions were introduced from the aspects of cognitive communication,resources sensing,inference decision,and services fit,and then the shortages and weaknesses of the existing solutions were summarized.Development tendencies on cognitive ability guarantee were proposed afterwards based on trust mechanism.Problems and challenges faced by cognitive ability guarantee as well as a discussion on the future research topics were referred to at last.

Key words: Cognitive radio network,Cognitive ability,Cognitive communication,Resources sensing,Services fit

[1] 薛楠,周贤伟,周健.认知无线电网络诱骗攻击问题及安全解决方案[J].电信科学,2009,25(5):81-87
[2] 黑永强,李晓辉,李文涛.认知网络中的多用户MIMO线性协作频谱感知问题研究[J].通信学报,2012,33(3):45-52
[3] 刘全,高俊,郭云玮,等.抗SSDF攻击的一致性协作频谱感知方案[J].电子学报,2011,39(11):2643-2648
[4] 曾昆,彭启航,唐友喜.基于信任节点辅助的安全协同频谱感知策略[J].信号处理,2011,27(4):486-491
[5] 贺倩,冯志勇,张平.基于人工智能技术的认知无线网络重构决策算法[J].通信学报,2012,33(7):96-102
[6] Fragkiadakis A G,Tragos E Z,Askoxylakis I G.A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks[J].Communications Surveys & Tutorials,IEEE,2013,15(1):428-445
[7] Vien Q T,Stewart B G,Tianfield H,et al.Efficient cooperative spectrum sensing for three-hop cognitive wireless relay networks[J].Communications,IET,2013,7(2):199-127
[8] Zhang Xing,Xing Jia,Yan Z,et al.Outage performance study of cognitive relay networks with imperfect channel knowledge[J].IEEE Communications Letters,2013,17(1):27-30
[9] Kumar R N,Bapuji V,Govardhan A,et al.An Improvement to Trust Based Cross-Layer Security Protocol against Sybil Attacks (DAS)[J].Computer Engineering and Intelligent Systems,2012,3(7):62-70
[10] León O,Hernández-Serrano J,Soriano M.Securing cognitive radio networks[J].International Journal of Communication Systems,2010,23(5):633-652
[11] Reddy K G,Thilagam P S.Intrusion Detection technique forwormhole and following jellyfish and byzantine attacks in wireless mesh network[J].Advanced Computing,Networking and Security,2012,7135:631-637
[12] Wang B,Wu Y,Liu K R,et al.An anti-jamming stochastic game for cognitive radio networks[J].IEEE Journal on Selected Areas in Communications,2011,29(4):877-889
[13] Wu Y,Wang B,Liu K,et al.Anti-jamming games in multi-channel cognitive radio networks[J].IEEE Journal on Selected Areas in Communications,2012,30(1):4-15 (下转第19页)(上接第13页)
[14] Asterjadhi A,Zorzi M.JENNA:a jamming evasive network-coding neighbor-discovery algorithm for cognitive radio networks [Dynamic Spectrum Management][J].Wireless Communications,IEEE,2010,17(4):24-32
[15] Zhang Lu,Pei Qing-qi,Li Hong-ning.Anti-jamming SchemeBased on Zero Pre-shared Secret in Cognitive Radio Network[C]∥Proceedings of Computational Intelligence and Security (CIS),2012Eighth International Conference on.Guangzhou,China,2012:670-673
[16] 聂晓文,卢显良,唐晖,等.基于洗牌策略的Sybil攻击防御[J].电子学报,2008(11):2144-2149
[17] 陈珊珊,杨庚,陈生寿.基于LEACH协议的Sybil攻击入侵检测机制[J].通信学报,2011,32(8):143-149
[18] Yu Bo,Xu Cheng-zhong,Xiao Bin.Detecting Sybil attacks inVANETs[J].Journal of Parallel and Distributed Computing,2013,73(6):746-756
[19] Kumar R N,Bapuji V,Govardhan A,et al.An Improvement to Trust Based Cross-Layer Security Protocol against Sybil Attacks (DAS)[J].Computer Engineering and Intelligent Systems,2012,3(7):62-70
[20] El Zoghby N,Cherfaoui V,Ducourthial B,et al.Distributed Data Fusion for Detecting Sybil Attacks in VANETs[M]∥Belief Functions:Theory and Applications.Springer Berlin Heidelberg,2012:351-358
[21] Chen Ze-sheng,Todor C,Chen Chao,et al.Modeling primary user emulation attacks and defenses in cognitive radio networks[C]∥Proceedings of 2009IEEE 28th International Performance Computing and Communications Conference (IPCCC).Scottsdale,AZ,2009:208-215
[22] Jin Z,Anand S,Subbalakshmi K.Detecting primary user emulation attacks in dynamic spectrum access networks[C]∥Procee-dings of 2009IEEE International Conference on Communications(ICC’09).Dresden,German,2009:1-5
[23] Jin Z,Anand S,Subbalakshmi K.Mitigating primary user emulation attacks in dynamic spectrum access networks using hypothesis testing[J].ACM SIGMOBILE Mobile Computing and Communications Review,2009,13(2):74-85
[24] Liu Y,Ning P,Dai H.Authenticating primary users’ signals in cognitive radio networks via integrated cryptographic and wireless link signatures[C]∥Proceedings of 2010IEEE Symposium on Security and Privacy (SP).Oakland,CA,USA,2010:286-301
[25] Wang Wen-kai,Li Hu-sheng,Sun Y L,et al.Attack-proof collaborative spectrum sensing in cognitive radio networks[C]∥Proceedings of the 43rd Annual Conference on Information Sciences and Systems(CISS 2009).Baltimore,MD,2009:130-134
[26] Zhu F,Seo S-W.Enhanced robust cooperative spectrum sensing in cognitive radio[J].Journal of Communications and Networks,2009,11(2):122-133
[27] Min A W,Shin K G,Hu Xin.Attack-tolerant distributed sensingfor dynamic spectrum access networks[C]∥Proceedings of 17th IEEE International Conference on Network Protocols(ICNP 2009).Princeton,NJ,2009:294-303
[28] Chen Rui-liang,Park Jung-min,Bian Kai-gui.Robust distributed spectrum sensing in cognitive radio networks[C]∥Proceedings of the 27th IEEE Conference on Computer Communications(INFOCOM 2008).Phoenix,AZ,2008:1876-1884
[29] Chen R,Park J-M J,Bian K.Robustness against byzantine fai-lures in distributed spectrum sensing[J].Computer Communications,2012,35(17):2115-2124
[30] Rawat A S,Anand P,Chen Hao,et al.Countering byzantine attacks in cognitive radio networks[C]∥Proceedings of 2010IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP).Dallas,TX,2010:3098-3101
[31] Nguyen-Thanh N,Koo I.An enhanced cooperative spectrumsensing scheme based on evidence theory and reliability source evaluation in cognitive radio context[J].Communications Letters,IEEE,2009,13(7):492-494
[32] Li Hu-sheng,Han Zhu.Catching attacker (s) for collaborative spectrum sensing in cognitive radio systems:An abnormality detection approach[C]∥Proceedings of 2010IEEE Symposium on New Frontiers in Dynamic Spectrum.Singapore,2010:1-12
[33] Tang H,Yu F R,Huang M,et al.Distributed consensus-basedsecurity mechanisms in cognitive radio mobile ad hoc networks[J].IET Communications,2012,6(8):974-983
[34] Zhang Yong-guang,Lee Wen-ke.Intrusion detection in wireless ad-hoc networks[C]∥Proceedings of the 6th annual international conference on Mobile computing and networking.ACM.New York,NY,USA,2000:275-283
[35] Pei Q,Li H,Ma J,et al.Defense against objective function attacks in cognitive radio networks[J].Chinese Journal of Electronics,2011,20(4):138-142
[36] Rathnayake U,Petander H,Ott M,et al.EMUNE:architecturefor mobile data transfer scheduling with network availability predictions[J].Mob.Netw.Appl.,2012,17(2):216-233
[37] Hernandez-Serrano J,León O,Soriano M.Modeling the lion at-tack in cognitive radio networks[J].EURASIP Journal on Wireless Communications and Networking,2011,2011:1-10

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!