融入糾錯編碼的認知無線電物理層安全認證研究
發(fā)布時間:2018-10-17 14:07
【摘要】:認知無線電技術(shù),是為了解決無線頻譜資源短缺以及通信標準的多樣化等問題提出的有效方案。在認知無線電網(wǎng)絡(luò)系統(tǒng)中,主用戶的優(yōu)先級別最高,次用戶只有在主用戶未占用信道的空閑時段可以以某種“機會”的方式暫時取代主用戶利用頻譜空洞在信道中傳輸數(shù)據(jù)。當主用戶需要重新使用信道時,次用戶必須馬上撤出,因此攻擊者常常模仿主用戶信號非法占用信道。為了解決主用戶攻擊的問題,需要在用戶接入信道前對用戶身份進行認證,F(xiàn)代無線通信系統(tǒng)中,若在上層通信網(wǎng)絡(luò)中對信號進行認證需要對信號進行復(fù)雜的解析操作,效率低、速率慢且沒有必要,而物理層認證技術(shù)很好的解決了這一問題。它利用Hash函數(shù)的單向性來有效解決主用戶認證問題,同時通過物理層低速率傳輸實現(xiàn)認證的隱藏傳輸,最大限度降低對合法用戶的干擾,保證通信雙方是其所聲稱的身份,防止非法用戶的接入與訪問。本文主要研究了認知無線電物理層安全認證中嵌入認證標簽的兩種方法:寄生調(diào)制方法與寄生糾錯編碼方法(ECC)。本論文的主要研究工作和創(chuàng)新如下:(1)首先研究了認知無線電物理層安全認證中的調(diào)制方案。從信道糾錯編碼的角度探討認知無線電寄生認證信道的容量。通過推導(dǎo)認證信道的對數(shù)似然比,給出了其簡化計算方式,分析與仿真結(jié)果表明:簡化計算與嚴格計算結(jié)果相仿,因而認證信道可等效為二元輸入的加性高斯白噪聲(BI-AWGN)信道;(2)在調(diào)制方案中,基于對數(shù)似然比的簡化形式,通過置信度傳播迭代譯碼,考察了融入LDPC糾錯機制的認證信道實際傳輸性能。仿真結(jié)果表明:簡化譯碼的結(jié)果與理想BI-AWGN的譯碼性能無法區(qū)分。研究結(jié)論:認知無線電寄生認證信道可嚴格等效為BI-AWGN信道,因而可采用BI-AWGN信道設(shè)計的糾錯編碼來有效逼近寄生認證信道的傳輸極限。(3)研究了認知無線電物理層安全認證中的編碼方案,首先對認證標簽進行編碼,再嵌入同樣經(jīng)過信道編碼的信息中;并對比了RS編碼與LDPC編碼兩種編碼方式在不同的信道上傳輸?shù)恼`碼率性能,分析結(jié)果表明:采用LDPC編碼比RS編碼性能更為優(yōu)越。(4)從誤碼率性能與認證標簽傳輸速率關(guān)系角度出發(fā),分析比較了寄生調(diào)制與寄生編碼這兩種方案性能的優(yōu)劣。本文分析結(jié)果表明:在同等誤碼率與信噪比的條件下,寄生調(diào)制方案標簽傳輸所需的時間要遠遠低于寄生編碼方案標簽傳輸所需的時間,由此可以得出寄生調(diào)制方案要優(yōu)于寄生糾錯編碼方案的結(jié)論。
[Abstract]:Cognitive radio technology is an effective solution to the shortage of wireless spectrum resources and the diversification of communication standards. In cognitive radio networks, primary users have the highest priority, and secondary users can temporarily replace primary users by using spectral holes to transmit data in the channel only in the idle time when the primary user does not occupy the channel. When the primary user needs to reuse the channel, the secondary user must withdraw immediately, so the attacker often imitates the primary user signal to illegally occupy the channel. In order to solve the problem of primary user attack, it is necessary to authenticate the user's identity before the user accesses the channel. In modern wireless communication system, if the signal is authenticated in the upper layer communication network, the signal needs complex parsing operation, which is inefficient, slow and unnecessary, and the physical layer authentication technology solves this problem very well. It makes use of the unidirectionality of Hash function to solve the problem of primary user authentication effectively. At the same time, it realizes the hidden transmission of authentication through physical layer low rate transmission, reduces the interference to legitimate users to the maximum extent, and ensures that both sides of communication are their claimed identities. Prevent illegal user access and access. This paper mainly studies two methods of embedding authentication tags in physical layer security authentication of cognitive radio: parasitic modulation method and parasitic error correction coding method (ECC). The main work and innovations of this thesis are as follows: (1) the modulation scheme in the physical layer security authentication of cognitive radio is studied firstly. The capacity of parasitic authentication channel of cognitive radio is discussed from the point of view of channel error correction coding. By deducing the logarithmic likelihood ratio of authentication channel, the simplified calculation method is given. The results of analysis and simulation show that the simplified calculation is similar to the rigorous calculation. Therefore, the authentication channel can be equivalent to an additive Gao Si white noise (BI-AWGN) channel with binary input. (2) in the modulation scheme, iterative decoding is propagated by confidence based on the simplified form of log-likelihood ratio. The actual transmission performance of authentication channel with LDPC error correction mechanism is investigated. The simulation results show that the simplified decoding results can not be distinguished from the decoding performance of ideal BI-AWGN. Conclusion: the parasitic authentication channel of cognitive radio can be strictly equivalent to BI-AWGN channel. Therefore, the error-correcting coding designed by BI-AWGN channel can be used to effectively approximate the transmission limit of parasitic authentication channel. (3) the coding scheme in the physical layer of cognitive radio authentication is studied. Firstly, the authentication label is coded. Then we embed the same channel coded information, and compared the BER performance of RS coding and LDPC coding on different channels. The analysis results show that the performance of LDPC coding is better than that of RS coding. (4) the performance of parasitic modulation scheme and parasitic coding scheme are analyzed and compared from the point of view of the relationship between bit error rate (BER) performance and the transmission rate of authentication tag. The results show that under the same BER and SNR, the time required for tag transmission of parasitic modulation scheme is much lower than that for tag transmission in parasitic coding scheme. It is concluded that the parasitic modulation scheme is superior to the parasitic error correction coding scheme.
【學(xué)位授予單位】:南京郵電大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2017
【分類號】:TN925
本文編號:2276912
[Abstract]:Cognitive radio technology is an effective solution to the shortage of wireless spectrum resources and the diversification of communication standards. In cognitive radio networks, primary users have the highest priority, and secondary users can temporarily replace primary users by using spectral holes to transmit data in the channel only in the idle time when the primary user does not occupy the channel. When the primary user needs to reuse the channel, the secondary user must withdraw immediately, so the attacker often imitates the primary user signal to illegally occupy the channel. In order to solve the problem of primary user attack, it is necessary to authenticate the user's identity before the user accesses the channel. In modern wireless communication system, if the signal is authenticated in the upper layer communication network, the signal needs complex parsing operation, which is inefficient, slow and unnecessary, and the physical layer authentication technology solves this problem very well. It makes use of the unidirectionality of Hash function to solve the problem of primary user authentication effectively. At the same time, it realizes the hidden transmission of authentication through physical layer low rate transmission, reduces the interference to legitimate users to the maximum extent, and ensures that both sides of communication are their claimed identities. Prevent illegal user access and access. This paper mainly studies two methods of embedding authentication tags in physical layer security authentication of cognitive radio: parasitic modulation method and parasitic error correction coding method (ECC). The main work and innovations of this thesis are as follows: (1) the modulation scheme in the physical layer security authentication of cognitive radio is studied firstly. The capacity of parasitic authentication channel of cognitive radio is discussed from the point of view of channel error correction coding. By deducing the logarithmic likelihood ratio of authentication channel, the simplified calculation method is given. The results of analysis and simulation show that the simplified calculation is similar to the rigorous calculation. Therefore, the authentication channel can be equivalent to an additive Gao Si white noise (BI-AWGN) channel with binary input. (2) in the modulation scheme, iterative decoding is propagated by confidence based on the simplified form of log-likelihood ratio. The actual transmission performance of authentication channel with LDPC error correction mechanism is investigated. The simulation results show that the simplified decoding results can not be distinguished from the decoding performance of ideal BI-AWGN. Conclusion: the parasitic authentication channel of cognitive radio can be strictly equivalent to BI-AWGN channel. Therefore, the error-correcting coding designed by BI-AWGN channel can be used to effectively approximate the transmission limit of parasitic authentication channel. (3) the coding scheme in the physical layer of cognitive radio authentication is studied. Firstly, the authentication label is coded. Then we embed the same channel coded information, and compared the BER performance of RS coding and LDPC coding on different channels. The analysis results show that the performance of LDPC coding is better than that of RS coding. (4) the performance of parasitic modulation scheme and parasitic coding scheme are analyzed and compared from the point of view of the relationship between bit error rate (BER) performance and the transmission rate of authentication tag. The results show that under the same BER and SNR, the time required for tag transmission of parasitic modulation scheme is much lower than that for tag transmission in parasitic coding scheme. It is concluded that the parasitic modulation scheme is superior to the parasitic error correction coding scheme.
【學(xué)位授予單位】:南京郵電大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2017
【分類號】:TN925
【參考文獻】
相關(guān)期刊論文 前1條
1 王麗娜;李超;周賢偉;;認知無線電的合作頻譜檢測分析[J];電訊技術(shù);2008年07期
相關(guān)碩士學(xué)位論文 前1條
1 李紅寧;認知無線電安全性研究[D];西安電子科技大學(xué);2010年
,本文編號:2276912
本文鏈接:http://sikaile.net/kejilunwen/xinxigongchenglunwen/2276912.html
最近更新
教材專著