计算机科学 ›› 2015, Vol. 42 ›› Issue (9): 151-153.doi: 10.11896/j.issn.1002-137X.2015.09.029

• 信息安全 • 上一篇    下一篇

基于分形加权维数的PUE攻击用户检测方法

田红园,姚引娣,郑文秀,王宏伟   

  1. 西安邮电大学 西安710061,西安邮电大学 西安710061,西安邮电大学 西安710061,西安邮电大学 西安710061
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受国家自然科学青年基金项目:面向认知Ad hoc网络多信道路由的信任管理研究(61301091),陕西省教育厅项目(14JK1668)资助

Method of PUE Attack User Detection by Weighted Fractal Dimension

TIAN Hong-yuan, YAO Yin-di, ZHENG Wen-xiu and WANG Hong-wei   

  • Online:2018-11-14 Published:2018-11-14

摘要: 针对主用户仿冒(PUE)攻击用户非法占用主用户信道而导致认知用户的可用频谱资源降低的问题,以辐射源的指纹特征为基础,定义分形加权维数,刻画通信信号码元包络的脉内起伏特征,提出了一种新的基于辐射源特征提取的PUE攻击检测方法。理论分析和实验结果表明,提出的检测方法能够有效地区分主用户和PUE攻击用户,并在信息安全领域发挥重要作用。

关键词: PUE攻击用户,辐射源特征提取,分形维数

Abstract: PUE attack users illegally occupy the primary user’s channel,resulting to the decrease of cognitive user’s available spectrum resources.Based on the fingerprint characteristics of the radiation source,this paper defined the fractal dimension weighted,and depicted the intrapulse fluctuation characteristics of the communication signal envelope.We proposed a new method of PUE attack detection by the feature extraction of radiation source.Theoretical analysis and experimental results show that this method can effectively distinguish between the main users and PUE attacks users,and it will play a great role in the field of information security.

Key words: PUE attack users,Radiation source feature extraction,Fractal dimension

[1] 肖天梅.认知无线电PUE攻击下次用户性能分析[J].通信技术,2013,46(4):22-27 Xiao Tian-mei.the performance analysis of Secondary user by Cognitive radio PUE attack [J].Communications Technology,2013,46(4):22-27
[2] 逄德明,胡罡,徐明.基于能量指纹匹配的无线认知网络仿冒主用户攻击检测[J].计算机科学,2011,38(3):28-33 Pang De-ming,Hu Gang,Xu Ming.The Cognitive wireless network counterfeit primary user attack detection of the energy fingerprints matching[J].Computer Science,2011,38(3):28-33
[3] 薛楠,周贤伟,辛晓瑜,等.一种解决认知无线电网络模仿主用户攻击问题的方案[J].计算机科学,2009,36(8):45-48 Xue Nan,Zhou Xian-wei,Xin Xiao-yu,et al.A solution of cognitive radio network imitating the primary user attack[J].Computer Science,2009,36(8):45-48
[4] 赵陆文,缪志敏,周志杰.基于SVDD的认知无线电网络仿冒主用户检测技术[J].信号处理,2010,26(7):974-979 Zhao Lu-wen,Miao Zhi-min,Zhou Zhi-jie.The cognitive radio network counterfeit primary user detection technology based on SVDD [J].The Signal Processing,2010,26(7):974-979
[5] 任黎丽.辐射源指纹识别与细微特征提取方法研究[D].哈尔滨:哈尔滨工程大学,2012 Ren Li-li.The study of Radiation source fingerprint identification and microscopic feature extraction method[D].Harbin:Harbin Engineering University,2012
[6] 徐书华.基于信号指纹的通信辐射源个体识别技术研究[D].武汉:华中科技大学,2007Xu Shu-hua.The study of Communication emitter individualidentification technology based on the signal fingerprint[D].Wuhan:Huazhong University of Science and Technology,2007
[7] 余志斌.基于脉内特征的雷达辐射源信号识别研究 [D].成都:西南交通大学,2010 Yu Zhi-bin.The Study of radar emitter signal recognition based on the Intra-pulse characteristics[D].Chengdu:Southwest Jiaotong University,2010
[8] 林震鹊,姜秋喜,黄建冲.雷达脉冲信号上升/下降沿测量影响因素[J].四川兵工学报,2010(1):117-120 Lin Zhen-que,Jiang Qiu-xi,Huang Jian-chong.The measurement factors of the radar pulse signal increase/decrease edge[J].Journal of Sichuan Armaments Factories,2010(1):117-120
[9] 郑文秀.MSK信号的参数估计[J].电路与系统学报,2011,16(2):23-27 Zheng Wen-xiu.MSK signal parameter estimation[J].Journal of Circuits and Systems,2011,16(2):23-27
[10] 张葛祥.雷达辐射源信号智能识别方法研究[D].成都:西南交通大学,2005 Zhang Ge-xiang.The study of Radar emitter signal intelligent identification method[D].Chengdu:Southwest Jiaotong University,2005
[11] 唐智灵.通信辐射源非线性个体识别方法研究[D].西安:西安电子科技大学,2013 Kang Zhi-ling.The study of Nonlinear individual identification method about communication source[D].Xi’an:Xi’an University of Electronic Science and Technology,2013
[12] 周斌.信号细微特征提取及识别技术研究[D].哈尔滨:哈尔滨工业大学,2011 Zhou Bin.The Study of signal fine feature extraction and recognition technology[D].Harbin:Harbin Institute of Technology,2011
[13] 王超,刘涛,杜利平.一种新的认知无线电主用户信号识别方法[J].电波科学学报,2009,24(6):1119-1123 Wang Chao,Liu Tao,Du Li-ping.A new method for cognitive radio users signal recognition[J].Waves Science Journals,2009,24(6):1119-1123

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!