天堂国产午夜亚洲专区-少妇人妻综合久久蜜臀-国产成人户外露出视频在线-国产91传媒一区二区三区

面向認(rèn)知網(wǎng)絡(luò)的異常協(xié)作節(jié)點(diǎn)評(píng)估方法研究

發(fā)布時(shí)間:2019-03-19 10:58
【摘要】:隨著無線技術(shù)的迅猛發(fā)展,用戶需求不斷增長,無線頻譜越發(fā)緊張,面臨著嚴(yán)重匱乏的問題。認(rèn)知無線網(wǎng)絡(luò)的出現(xiàn)為解決頻譜資源不足,提高頻譜資源利用率,提供了重要思路,已成為近年來廣泛研究的熱點(diǎn)。它通過動(dòng)態(tài)的感知周圍環(huán)境信息,并對(duì)其進(jìn)行學(xué)習(xí)和分析,然后根據(jù)當(dāng)前狀況進(jìn)行相應(yīng)的規(guī)劃和決策,從而實(shí)現(xiàn)對(duì)頻譜資源的“二次利用”。然而由于其開放共享的通信資源環(huán)境,使其比起傳統(tǒng)無線網(wǎng)絡(luò),更易受到安全攻擊,特別是來自惡意實(shí)體和自私實(shí)體的干擾及攻擊,將破壞感知數(shù)據(jù)的可信性,威脅可信認(rèn)知能力,影響認(rèn)知決策和頻譜分配的公平性。傳統(tǒng)的網(wǎng)絡(luò)加解密、身份驗(yàn)證等防御技術(shù),無法有效的解決這些內(nèi)部安全威脅,而信譽(yù)機(jī)制作為傳統(tǒng)安全方案的補(bǔ)充,能夠有效的解決網(wǎng)絡(luò)內(nèi)部的安全問題。因此本文借鑒信譽(yù)理論,結(jié)合認(rèn)知無線網(wǎng)絡(luò)自身特征,從整個(gè)認(rèn)知過程出發(fā),針對(duì)惡意實(shí)體和自私實(shí)體,提出一個(gè)面向認(rèn)知網(wǎng)絡(luò)的異常協(xié)作節(jié)點(diǎn)評(píng)估機(jī)制,通過該機(jī)制去監(jiān)督和評(píng)估網(wǎng)絡(luò)中各實(shí)體行為,及時(shí)發(fā)現(xiàn)并處理網(wǎng)絡(luò)中的惡意和自私實(shí)體,從而增強(qiáng)實(shí)體合作性,為可靠的頻譜接入及網(wǎng)絡(luò)安全性能提供保障。本文主要工作如下:(1)首先分析當(dāng)前認(rèn)知無線網(wǎng)絡(luò)中存在的安全威脅,梳理了認(rèn)知無線網(wǎng)絡(luò)安全機(jī)制的研究脈絡(luò),分析了在認(rèn)知無線網(wǎng)絡(luò)中引入信譽(yù)機(jī)制的背景和動(dòng)機(jī)。(2)在現(xiàn)有的集中式網(wǎng)絡(luò)拓?fù)浠A(chǔ)上,針對(duì)認(rèn)知無線網(wǎng)絡(luò)自身特點(diǎn),提出基于位置分簇的認(rèn)知無線網(wǎng)絡(luò),考慮到位置因素對(duì)認(rèn)知用戶感知特性的影響,彌補(bǔ)了認(rèn)知網(wǎng)絡(luò)中拓?fù)淇刂品矫嫜芯康目瞻?為信譽(yù)評(píng)估機(jī)制的提出打下模型基礎(chǔ)。(3)針對(duì)現(xiàn)有方法孤立研究各協(xié)議層威脅,缺乏對(duì)整個(gè)認(rèn)知過程的考量,以及沒有將信譽(yù)與認(rèn)知能力相結(jié)合來提高網(wǎng)絡(luò)安全等缺點(diǎn)。本文在基于位置分簇的網(wǎng)絡(luò)拓?fù)浠A(chǔ)上,建立了基于認(rèn)知環(huán)的信譽(yù)評(píng)估機(jī)制,通過對(duì)節(jié)點(diǎn)信譽(yù)狀態(tài)的評(píng)估,去發(fā)現(xiàn)異常實(shí)體,并通過獎(jiǎng)懲機(jī)制對(duì)其進(jìn)行處理,以提高認(rèn)知能力的可靠性,保障頻譜接入的公平性。(4)通過仿真分析,驗(yàn)證了所提機(jī)制對(duì)評(píng)估和抵御惡意實(shí)體及自私實(shí)體的有效性及優(yōu)越性。
[Abstract]:With the rapid development of wireless technology, the demand of users is increasing, and the wireless spectrum is becoming more and more tense, which is facing the problem of serious shortage. The emergence of cognitive wireless network provides an important way to solve the shortage of spectrum resources and improve the efficiency of spectrum resources, and has become a hot topic in recent years. It realizes the "secondary utilization" of spectrum resources by dynamically perceiving the surrounding environment information, learning and analyzing it, and then making corresponding planning and decision-making according to the current situation. However, because of its open and shared communication resource environment, it is more vulnerable to security attacks than traditional wireless networks, especially interference and attacks from malicious entities and selfish entities, which will undermine the credibility of perceptual data. Threat to credible cognitive ability affects the fairness of cognitive decision-making and spectrum allocation. Traditional network encryption and decryption, authentication and other defense techniques can not effectively solve these internal security threats, and reputation mechanism, as the supplement of traditional security schemes, can effectively solve the internal security problems of the network. Therefore, referring to the reputation theory and combining the characteristics of cognitive wireless network, this paper proposes an abnormal cooperative node evaluation mechanism for cognitive networks, aiming at malicious entities and selfish entities, and starting from the whole cognitive process, this paper proposes an abnormal cooperative node evaluation mechanism for cognitive networks. Through this mechanism, we can monitor and evaluate the behavior of entities in the network, detect and deal with the malicious and selfish entities in the network in time, so as to enhance the cooperation of entities and provide the guarantee for reliable spectrum access and network security. The main work of this paper is as follows: (1) at first, the security threats in cognitive wireless network are analyzed, and the research context of cognitive wireless network security mechanism is combed. This paper analyzes the background and motivation of introducing reputation mechanism into cognitive wireless networks. (2) based on the existing centralized network topology, a location-based clustering cognitive wireless network is proposed according to the characteristics of cognitive wireless networks. Considering the influence of location factors on cognitive user perception, it makes up for the gaps in topology control research in cognitive networks, and lays a model foundation for the establishment of reputation assessment mechanism. (3) the threat of each protocol layer is studied in isolation according to the existing methods. Lack of consideration of the whole cognitive process, and lack of credit and cognitive ability to improve network security and other shortcomings. In this paper, based on the network topology based on location clustering, a reputation evaluation mechanism based on cognitive ring is established. By evaluating the reputation status of nodes, abnormal entities are found and processed by reward and punishment mechanism. In order to improve the reliability of cognitive ability and ensure the fairness of spectrum access. (4) the validity and superiority of the proposed mechanism for evaluating and resisting malicious entities and selfish entities are verified by simulation analysis.
【學(xué)位授予單位】:哈爾濱工程大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2014
【分類號(hào)】:TN925

【參考文獻(xiàn)】

相關(guān)期刊論文 前10條

1 張峻源;張彥旭;;認(rèn)知無線電中基于位置信息的分簇協(xié)作檢測算法[J];電子世界;2012年23期

2 王健;劉衍珩;張婧;劉雪蓮;;移動(dòng)自組網(wǎng)的主觀信任建模與仿真[J];電子學(xué)報(bào);2011年12期

3 魏急波;王杉;趙海濤;;認(rèn)知無線網(wǎng)絡(luò):關(guān)鍵技術(shù)與研究現(xiàn)狀[J];通信學(xué)報(bào);2011年11期

4 劉全;高俊;郭云瑋;劉思洋;;抗SSDF攻擊的一致性協(xié)作頻譜感知方案[J];電子學(xué)報(bào);2011年11期

5 許建霞;劉會(huì)衡;劉克中;;基于能量檢測的頻譜感知技術(shù)研究與仿真[J];武漢理工大學(xué)學(xué)報(bào)(交通科學(xué)與工程版);2011年03期

6 李勇軍;代亞非;;對(duì)等網(wǎng)絡(luò)信任機(jī)制研究[J];計(jì)算機(jī)學(xué)報(bào);2010年03期

7 應(yīng)小凡;;認(rèn)知無線電通信系統(tǒng)關(guān)鍵技術(shù)研究[J];通信技術(shù);2010年03期

8 滑楠;曹志剛;;無線認(rèn)知網(wǎng)絡(luò)概念與實(shí)例研究[J];計(jì)算機(jī)工程與應(yīng)用;2009年02期

9 周賢偉;辛?xí)澡?王麗娜;薛楠;;認(rèn)知無線電安全關(guān)鍵技術(shù)研究[J];電信科學(xué);2008年02期

10 張學(xué);陸桑璐;陳貴海;陳道蓄;謝立;;無線傳感器網(wǎng)絡(luò)的拓?fù)淇刂芠J];軟件學(xué)報(bào);2007年04期

相關(guān)博士學(xué)位論文 前2條

1 楊磊;認(rèn)知無線電系統(tǒng)中若干關(guān)鍵技術(shù)的研究[D];大連理工大學(xué);2012年

2 賀鵬;移動(dòng)Ad Hoc網(wǎng)絡(luò)中路由與拓?fù)淇刂萍夹g(shù)的研究[D];西安電子科技大學(xué);2007年

,

本文編號(hào):2443458

資料下載
論文發(fā)表

本文鏈接:http://sikaile.net/kejilunwen/wltx/2443458.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權(quán)申明:資料由用戶f50af***提供,本站僅收錄摘要或目錄,作者需要?jiǎng)h除請(qǐng)E-mail郵箱bigeng88@qq.com