面向認(rèn)知網(wǎng)絡(luò)的異常協(xié)作節(jié)點(diǎn)評(píng)估方法研究
[Abstract]:With the rapid development of wireless technology, the demand of users is increasing, and the wireless spectrum is becoming more and more tense, which is facing the problem of serious shortage. The emergence of cognitive wireless network provides an important way to solve the shortage of spectrum resources and improve the efficiency of spectrum resources, and has become a hot topic in recent years. It realizes the "secondary utilization" of spectrum resources by dynamically perceiving the surrounding environment information, learning and analyzing it, and then making corresponding planning and decision-making according to the current situation. However, because of its open and shared communication resource environment, it is more vulnerable to security attacks than traditional wireless networks, especially interference and attacks from malicious entities and selfish entities, which will undermine the credibility of perceptual data. Threat to credible cognitive ability affects the fairness of cognitive decision-making and spectrum allocation. Traditional network encryption and decryption, authentication and other defense techniques can not effectively solve these internal security threats, and reputation mechanism, as the supplement of traditional security schemes, can effectively solve the internal security problems of the network. Therefore, referring to the reputation theory and combining the characteristics of cognitive wireless network, this paper proposes an abnormal cooperative node evaluation mechanism for cognitive networks, aiming at malicious entities and selfish entities, and starting from the whole cognitive process, this paper proposes an abnormal cooperative node evaluation mechanism for cognitive networks. Through this mechanism, we can monitor and evaluate the behavior of entities in the network, detect and deal with the malicious and selfish entities in the network in time, so as to enhance the cooperation of entities and provide the guarantee for reliable spectrum access and network security. The main work of this paper is as follows: (1) at first, the security threats in cognitive wireless network are analyzed, and the research context of cognitive wireless network security mechanism is combed. This paper analyzes the background and motivation of introducing reputation mechanism into cognitive wireless networks. (2) based on the existing centralized network topology, a location-based clustering cognitive wireless network is proposed according to the characteristics of cognitive wireless networks. Considering the influence of location factors on cognitive user perception, it makes up for the gaps in topology control research in cognitive networks, and lays a model foundation for the establishment of reputation assessment mechanism. (3) the threat of each protocol layer is studied in isolation according to the existing methods. Lack of consideration of the whole cognitive process, and lack of credit and cognitive ability to improve network security and other shortcomings. In this paper, based on the network topology based on location clustering, a reputation evaluation mechanism based on cognitive ring is established. By evaluating the reputation status of nodes, abnormal entities are found and processed by reward and punishment mechanism. In order to improve the reliability of cognitive ability and ensure the fairness of spectrum access. (4) the validity and superiority of the proposed mechanism for evaluating and resisting malicious entities and selfish entities are verified by simulation analysis.
【學(xué)位授予單位】:哈爾濱工程大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2014
【分類號(hào)】:TN925
【參考文獻(xiàn)】
相關(guān)期刊論文 前10條
1 張峻源;張彥旭;;認(rèn)知無線電中基于位置信息的分簇協(xié)作檢測算法[J];電子世界;2012年23期
2 王健;劉衍珩;張婧;劉雪蓮;;移動(dòng)自組網(wǎng)的主觀信任建模與仿真[J];電子學(xué)報(bào);2011年12期
3 魏急波;王杉;趙海濤;;認(rèn)知無線網(wǎng)絡(luò):關(guān)鍵技術(shù)與研究現(xiàn)狀[J];通信學(xué)報(bào);2011年11期
4 劉全;高俊;郭云瑋;劉思洋;;抗SSDF攻擊的一致性協(xié)作頻譜感知方案[J];電子學(xué)報(bào);2011年11期
5 許建霞;劉會(huì)衡;劉克中;;基于能量檢測的頻譜感知技術(shù)研究與仿真[J];武漢理工大學(xué)學(xué)報(bào)(交通科學(xué)與工程版);2011年03期
6 李勇軍;代亞非;;對(duì)等網(wǎng)絡(luò)信任機(jī)制研究[J];計(jì)算機(jī)學(xué)報(bào);2010年03期
7 應(yīng)小凡;;認(rèn)知無線電通信系統(tǒng)關(guān)鍵技術(shù)研究[J];通信技術(shù);2010年03期
8 滑楠;曹志剛;;無線認(rèn)知網(wǎng)絡(luò)概念與實(shí)例研究[J];計(jì)算機(jī)工程與應(yīng)用;2009年02期
9 周賢偉;辛?xí)澡?王麗娜;薛楠;;認(rèn)知無線電安全關(guān)鍵技術(shù)研究[J];電信科學(xué);2008年02期
10 張學(xué);陸桑璐;陳貴海;陳道蓄;謝立;;無線傳感器網(wǎng)絡(luò)的拓?fù)淇刂芠J];軟件學(xué)報(bào);2007年04期
相關(guān)博士學(xué)位論文 前2條
1 楊磊;認(rèn)知無線電系統(tǒng)中若干關(guān)鍵技術(shù)的研究[D];大連理工大學(xué);2012年
2 賀鵬;移動(dòng)Ad Hoc網(wǎng)絡(luò)中路由與拓?fù)淇刂萍夹g(shù)的研究[D];西安電子科技大學(xué);2007年
,本文編號(hào):2443458
本文鏈接:http://sikaile.net/kejilunwen/wltx/2443458.html