认知无线电网络安全与隐私保护技术研究
发布时间:2018-05-27 23:13
本文选题:认知无线电网络 + 频谱感知数据篡改攻击 ; 参考:《西安电子科技大学》2014年博士论文
【摘要】:随着无线通信技术的快速发展,部分频段越来越拥挤,已无法满足日益增加的无线用户的需求。但调查表明,大部分授权频段却处于空闲状态。为了充分利用频谱资源,为更多的用户提供服务,认知无线电网络应运而生。认知无线电网络在不影响授权用户(主用户)的前提下,为非授权用户(认知用户)提供频谱接入的机会,具有良好的应用前景。 如何获取主用户网络的空闲频谱信息并对其合理分配是认知无线电网络中至关重要的问题。由于无线环境的多变性和主用户信号状态的不固定性,准确可靠的频谱感知成为认知无线电网络运行的前提和基础,而恶意节点的数据篡改将会破坏感知数据的真实性,从而严重影响认知无线电网络的正常运行;由于空闲频谱的动态性和可用信息的公开性,使得攻击者容易对认知用户的频谱感知和接入造成破坏,因此引起的DoS攻击将会阻碍用户的频谱接入,从而最终导致认知用户无法利用可用频谱,造成频谱资源的浪费。此外,在不影响主用户的前提下,如何使认知用户之间在互不干扰的条件下,安全使用空闲信道,最大化个人隐私信息保护力度,是认知无线电网络面临的巨大挑战。本文针对上述认知无线电网络中出现的安全与隐私问题进行研究,所取得的主要研究成果如下: 1.针对分簇式认知无线电网络频谱感知过程中的合谋攻击,提出了一种基于信任机制的分段频谱感知方案。该方案通过对待感知频段重新绑定、对认知用户模数分组,进行一一映射的频谱感知,并利用认知用户信誉值作为数据融合的参考,能够及时发现恶意用户,有效阻止合谋攻击,保证频谱感知数据的可靠性。 2.针对无中心设施下的频谱感知数据篡改攻击,提出了一种基于邻居节点检测的收敛感知算法。该算法通过认知用户本地感知,和邻居节点交互感知数据来达到局部感知数据的统一;收敛过程中,可信邻居节点集合的更新能够剔除可疑节点,提高感知数据更新的准确性;且利用邻居节点检测机制,对可信邻居节点进行感知数据检测,及时发现并修正受损的感知数据,对最终感知结果进行可靠性判决。 3.针对频谱分配过程中的追踪用户攻击,提出了一种基于有序集合的抗追踪用户攻击信道选择方案。考虑到信道申请过程中的信息泄漏,采用认知用户偏好使用信道集合中对应的序号来代替所选信道,可以有效隐藏所选信道的信息;通过偏好使用信道的同步更新机制,动态改变偏好信道对应的序号,提高攻击者获取所选信道信息的难度。该方案能够隐藏认知用户选择的信道信息,使攻击者无法追踪到认知用户,有效抵抗了追踪用户攻击,保障认知用户的频谱接入。 4.针对频谱分配中由于历史信道使用信息而造成的位置隐私泄漏问题,提出一种自共存机制下的位置隐私保护信道选择方案。利用自共存机制为每个基站分配可用频谱,达到了认知用户之间无干扰的频谱共享;通过Hash匹配,使认知用户在不泄露身份的前提下,获得频谱使用权;另外,,采用基站统一注册的方式,有效防止了认知用户频谱使用信息的泄漏。攻击者即使获得了数据库中的注册信息,也无法通过此信息与某个认知用户联系起来。因此,该方案在充分利用频谱资源的条件下,保护了认知用户的位置隐私。
[Abstract]:With the rapid development of wireless communication technology, some frequency bands are becoming more and more crowded and can not meet the demand of increasing wireless users. However, the survey shows that most of the authorized bands are idle. In order to make full use of spectrum resources and provide services for more users, it is known that radio networks emerge as the times require. Without affecting the authorized users (primary users), it provides the opportunity for spectrum access for unauthorized users (cognitive users), and has good application prospects.
How to obtain and allocate the free spectrum information of the main user network is the most important problem in the cognitive radio network. Due to the variability of the wireless environment and the unfixed state of the main user signal, the accurate and reliable spectrum sensing is the prerequisite and foundation for the operation of the cognitive radio network, and the data tamper of the malicious nodes is changed. It will disrupt the authenticity of the perceptual data and seriously affect the normal operation of the cognitive radio network. Because of the dynamic performance of the idle spectrum and the openness of the available information, the attacker is prone to damage the spectrum perception and access of the cognitive users. Therefore, the DoS attack will impede the user's spectrum access, thus leading to the final guide. The cognitive users are unable to make use of the available spectrum to cause the waste of spectrum resources. In addition, it is a great challenge to realize the maximum protection of personal privacy information under the condition that the users are not interfered with each other without interfering with the main users. The security and privacy issues in the radio network have been studied. The main research results are as follows:
1. aiming at the conspiracy attack in the spectrum sensing process of cluster cognitive radio networks, a segmented spectrum sensing scheme based on trust mechanism is proposed. By treating the perceptual frequency segment to be re bound, the spectrum perception of the cognitive user module is mapped one by one, and the credit value of the cognitive user is used as the reference of the data fusion. It can detect malicious users in time, effectively prevent collusion attacks, and ensure the reliability of spectrum sensing data.
2. a convergence perception algorithm based on neighbor node detection is proposed for spectrum sensing data tampering attack under the non central facility. The algorithm achieves the unification of local perceptual data through the local perception of the cognitive users and the interaction of the neighbor nodes, and the update of the trusted neighbor node set can be eliminated during the convergence process. By using the neighbor node detection mechanism, we can detect the perceived data of the trusted neighbor nodes, discover and correct the damaged perceived data in time, and make a reliability decision for the final perception results.
3. aiming at the tracking user attack in the spectrum allocation process, an anti tracking user attack channel selection scheme based on the ordered set is proposed. Considering the information leakage in the channel application process, the corresponding serial number of the channel set is used to replace the selected channel, which can effectively hide the information of the selected channel. By using the synchronization update mechanism of the channel, it can dynamically change the sequence number of the preferred channel and improve the difficulty of the attacker to obtain the selected channel information. This scheme can hide the channel information selected by the cognitive users, make the attacker unable to track the cognitive users, effectively resist the tracking user attack, and ensure the spectrum access of the cognitive users.
4. to solve the problem of location privacy leakage caused by the use of historical channel information in the spectrum allocation, a location privacy protection channel selection scheme under the self coexistence mechanism is proposed. Using the self coexistence mechanism to allocate the available spectrum for each base station, achieve the non interference spectrum sharing among the cognitive users, and make the cognitive use by Hash matching. In addition, the unified registration of the base station can effectively prevent the information leakage of the cognitive user spectrum. Even if the attacker has acquired the registration information in the database, the attacker can not connect the information to a certain cognitive user. Therefore, the scheme is fully using frequency. Under the condition of spectrum resources, the location privacy of cognitive users is protected.
【学位授予单位】:西安电子科技大学
【学位级别】:博士
【学位授予年份】:2014
【分类号】:TN925
【参考文献】
相关期刊论文 前4条
1 闫琦;杨家玮;张雯;;认知无线电网络中安全的合作频谱感知[J];北京邮电大学学报;2011年02期
2 葛新阳;刘元安;刘凯明;林乐翔;;基于信任的认知无线电安全认证方案[J];保密科学技术;2011年10期
3 罗涛;赵明;李静叶;乐光新;王小军;;认知无线电自组织网络MAC协议[J];计算机学报;2013年07期
4 裴庆祺;李红宁;赵弘洋;李男;闵莹;;认知无线电网络安全综述[J];通信学报;2013年01期
本文编号:1944194
本文链接:https://www.wllwen.com/kejilunwen/wltx/1944194.html