認(rèn)知無線電網(wǎng)絡(luò)安全與隱私保護(hù)技術(shù)研究
發(fā)布時(shí)間:2018-05-27 23:13
本文選題:認(rèn)知無線電網(wǎng)絡(luò) + 頻譜感知數(shù)據(jù)篡改攻擊; 參考:《西安電子科技大學(xué)》2014年博士論文
【摘要】:隨著無線通信技術(shù)的快速發(fā)展,部分頻段越來越擁擠,已無法滿足日益增加的無線用戶的需求。但調(diào)查表明,大部分授權(quán)頻段卻處于空閑狀態(tài)。為了充分利用頻譜資源,為更多的用戶提供服務(wù),認(rèn)知無線電網(wǎng)絡(luò)應(yīng)運(yùn)而生。認(rèn)知無線電網(wǎng)絡(luò)在不影響授權(quán)用戶(主用戶)的前提下,為非授權(quán)用戶(認(rèn)知用戶)提供頻譜接入的機(jī)會(huì),具有良好的應(yīng)用前景。 如何獲取主用戶網(wǎng)絡(luò)的空閑頻譜信息并對(duì)其合理分配是認(rèn)知無線電網(wǎng)絡(luò)中至關(guān)重要的問題。由于無線環(huán)境的多變性和主用戶信號(hào)狀態(tài)的不固定性,準(zhǔn)確可靠的頻譜感知成為認(rèn)知無線電網(wǎng)絡(luò)運(yùn)行的前提和基礎(chǔ),而惡意節(jié)點(diǎn)的數(shù)據(jù)篡改將會(huì)破壞感知數(shù)據(jù)的真實(shí)性,從而嚴(yán)重影響認(rèn)知無線電網(wǎng)絡(luò)的正常運(yùn)行;由于空閑頻譜的動(dòng)態(tài)性和可用信息的公開性,使得攻擊者容易對(duì)認(rèn)知用戶的頻譜感知和接入造成破壞,因此引起的DoS攻擊將會(huì)阻礙用戶的頻譜接入,從而最終導(dǎo)致認(rèn)知用戶無法利用可用頻譜,造成頻譜資源的浪費(fèi)。此外,在不影響主用戶的前提下,如何使認(rèn)知用戶之間在互不干擾的條件下,安全使用空閑信道,最大化個(gè)人隱私信息保護(hù)力度,是認(rèn)知無線電網(wǎng)絡(luò)面臨的巨大挑戰(zhàn)。本文針對(duì)上述認(rèn)知無線電網(wǎng)絡(luò)中出現(xiàn)的安全與隱私問題進(jìn)行研究,所取得的主要研究成果如下: 1.針對(duì)分簇式認(rèn)知無線電網(wǎng)絡(luò)頻譜感知過程中的合謀攻擊,提出了一種基于信任機(jī)制的分段頻譜感知方案。該方案通過對(duì)待感知頻段重新綁定、對(duì)認(rèn)知用戶模數(shù)分組,進(jìn)行一一映射的頻譜感知,并利用認(rèn)知用戶信譽(yù)值作為數(shù)據(jù)融合的參考,能夠及時(shí)發(fā)現(xiàn)惡意用戶,有效阻止合謀攻擊,保證頻譜感知數(shù)據(jù)的可靠性。 2.針對(duì)無中心設(shè)施下的頻譜感知數(shù)據(jù)篡改攻擊,提出了一種基于鄰居節(jié)點(diǎn)檢測(cè)的收斂感知算法。該算法通過認(rèn)知用戶本地感知,和鄰居節(jié)點(diǎn)交互感知數(shù)據(jù)來達(dá)到局部感知數(shù)據(jù)的統(tǒng)一;收斂過程中,可信鄰居節(jié)點(diǎn)集合的更新能夠剔除可疑節(jié)點(diǎn),提高感知數(shù)據(jù)更新的準(zhǔn)確性;且利用鄰居節(jié)點(diǎn)檢測(cè)機(jī)制,對(duì)可信鄰居節(jié)點(diǎn)進(jìn)行感知數(shù)據(jù)檢測(cè),及時(shí)發(fā)現(xiàn)并修正受損的感知數(shù)據(jù),對(duì)最終感知結(jié)果進(jìn)行可靠性判決。 3.針對(duì)頻譜分配過程中的追蹤用戶攻擊,提出了一種基于有序集合的抗追蹤用戶攻擊信道選擇方案?紤]到信道申請(qǐng)過程中的信息泄漏,采用認(rèn)知用戶偏好使用信道集合中對(duì)應(yīng)的序號(hào)來代替所選信道,可以有效隱藏所選信道的信息;通過偏好使用信道的同步更新機(jī)制,動(dòng)態(tài)改變偏好信道對(duì)應(yīng)的序號(hào),提高攻擊者獲取所選信道信息的難度。該方案能夠隱藏認(rèn)知用戶選擇的信道信息,使攻擊者無法追蹤到認(rèn)知用戶,有效抵抗了追蹤用戶攻擊,保障認(rèn)知用戶的頻譜接入。 4.針對(duì)頻譜分配中由于歷史信道使用信息而造成的位置隱私泄漏問題,提出一種自共存機(jī)制下的位置隱私保護(hù)信道選擇方案。利用自共存機(jī)制為每個(gè)基站分配可用頻譜,達(dá)到了認(rèn)知用戶之間無干擾的頻譜共享;通過Hash匹配,使認(rèn)知用戶在不泄露身份的前提下,獲得頻譜使用權(quán);另外,,采用基站統(tǒng)一注冊(cè)的方式,有效防止了認(rèn)知用戶頻譜使用信息的泄漏。攻擊者即使獲得了數(shù)據(jù)庫(kù)中的注冊(cè)信息,也無法通過此信息與某個(gè)認(rèn)知用戶聯(lián)系起來。因此,該方案在充分利用頻譜資源的條件下,保護(hù)了認(rèn)知用戶的位置隱私。
[Abstract]:With the rapid development of wireless communication technology, some frequency bands are becoming more and more crowded and can not meet the demand of increasing wireless users. However, the survey shows that most of the authorized bands are idle. In order to make full use of spectrum resources and provide services for more users, it is known that radio networks emerge as the times require. Without affecting the authorized users (primary users), it provides the opportunity for spectrum access for unauthorized users (cognitive users), and has good application prospects.
How to obtain and allocate the free spectrum information of the main user network is the most important problem in the cognitive radio network. Due to the variability of the wireless environment and the unfixed state of the main user signal, the accurate and reliable spectrum sensing is the prerequisite and foundation for the operation of the cognitive radio network, and the data tamper of the malicious nodes is changed. It will disrupt the authenticity of the perceptual data and seriously affect the normal operation of the cognitive radio network. Because of the dynamic performance of the idle spectrum and the openness of the available information, the attacker is prone to damage the spectrum perception and access of the cognitive users. Therefore, the DoS attack will impede the user's spectrum access, thus leading to the final guide. The cognitive users are unable to make use of the available spectrum to cause the waste of spectrum resources. In addition, it is a great challenge to realize the maximum protection of personal privacy information under the condition that the users are not interfered with each other without interfering with the main users. The security and privacy issues in the radio network have been studied. The main research results are as follows:
1. aiming at the conspiracy attack in the spectrum sensing process of cluster cognitive radio networks, a segmented spectrum sensing scheme based on trust mechanism is proposed. By treating the perceptual frequency segment to be re bound, the spectrum perception of the cognitive user module is mapped one by one, and the credit value of the cognitive user is used as the reference of the data fusion. It can detect malicious users in time, effectively prevent collusion attacks, and ensure the reliability of spectrum sensing data.
2. a convergence perception algorithm based on neighbor node detection is proposed for spectrum sensing data tampering attack under the non central facility. The algorithm achieves the unification of local perceptual data through the local perception of the cognitive users and the interaction of the neighbor nodes, and the update of the trusted neighbor node set can be eliminated during the convergence process. By using the neighbor node detection mechanism, we can detect the perceived data of the trusted neighbor nodes, discover and correct the damaged perceived data in time, and make a reliability decision for the final perception results.
3. aiming at the tracking user attack in the spectrum allocation process, an anti tracking user attack channel selection scheme based on the ordered set is proposed. Considering the information leakage in the channel application process, the corresponding serial number of the channel set is used to replace the selected channel, which can effectively hide the information of the selected channel. By using the synchronization update mechanism of the channel, it can dynamically change the sequence number of the preferred channel and improve the difficulty of the attacker to obtain the selected channel information. This scheme can hide the channel information selected by the cognitive users, make the attacker unable to track the cognitive users, effectively resist the tracking user attack, and ensure the spectrum access of the cognitive users.
4. to solve the problem of location privacy leakage caused by the use of historical channel information in the spectrum allocation, a location privacy protection channel selection scheme under the self coexistence mechanism is proposed. Using the self coexistence mechanism to allocate the available spectrum for each base station, achieve the non interference spectrum sharing among the cognitive users, and make the cognitive use by Hash matching. In addition, the unified registration of the base station can effectively prevent the information leakage of the cognitive user spectrum. Even if the attacker has acquired the registration information in the database, the attacker can not connect the information to a certain cognitive user. Therefore, the scheme is fully using frequency. Under the condition of spectrum resources, the location privacy of cognitive users is protected.
【學(xué)位授予單位】:西安電子科技大學(xué)
【學(xué)位級(jí)別】:博士
【學(xué)位授予年份】:2014
【分類號(hào)】:TN925
【參考文獻(xiàn)】
相關(guān)期刊論文 前4條
1 閆琦;楊家瑋;張?chǎng)?;認(rèn)知無線電網(wǎng)絡(luò)中安全的合作頻譜感知[J];北京郵電大學(xué)學(xué)報(bào);2011年02期
2 葛新陽;劉元安;劉凱明;林樂翔;;基于信任的認(rèn)知無線電安全認(rèn)證方案[J];保密科學(xué)技術(shù);2011年10期
3 羅濤;趙明;李靜葉;樂光新;王小軍;;認(rèn)知無線電自組織網(wǎng)絡(luò)MAC協(xié)議[J];計(jì)算機(jī)學(xué)報(bào);2013年07期
4 裴慶祺;李紅寧;趙弘洋;李男;閔瑩;;認(rèn)知無線電網(wǎng)絡(luò)安全綜述[J];通信學(xué)報(bào);2013年01期
本文編號(hào):1944194
本文鏈接:http://sikaile.net/kejilunwen/wltx/1944194.html
最近更新
教材專著