• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

移动网络中存在动态拜占庭攻击时的顺序协作频谱感知。

Sequential cooperative spectrum sensing in the presence of dynamic Byzantine attack for mobile networks.

机构信息

National Mobile Communication Research Lab, School of Information Science and Engineering, Southeast University, Nanjing, China.

出版信息

PLoS One. 2018 Jul 5;13(7):e0199546. doi: 10.1371/journal.pone.0199546. eCollection 2018.

DOI:10.1371/journal.pone.0199546
PMID:29975727
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC6033420/
Abstract

Cooperative spectrum sensing (CSS) is envisaged as a powerful approach to improve the utilization of scarce radio spectrum resources, but it is threatened by Byzantine attack. Byzantine attack has been becoming a popular research topic in both academia and industry due to the demanding requirements of security. Extensive research mainly aims at mitigating the negative effect of Byzantine attack on CSS, but with some strong assumptions, such as attackers are in minority or trusted node(s) exist for data fusion, while paying little attention to a mobile scenario. This paper focuses on the issue of designing a general and reliable reference for CSS in a mobile network. Instead of the previously simplified attack, we develop a generic Byzantine attack model from sophisticated behaviors to conduct various attack strategies and derive the condition of which Byzantine attack makes the fusion center (FC) blind. Specifically, we propose a robust sequential CSS (SCSS) against dynamic Byzantine attack. Our proposed method solves the unreliability of the FC by means of delivery-based assessment to check consistency of individual sensing report, and innovatively reuses the sensing information from Byzantines via a novel weight allocation mechanism. Furthermore, trust value (TrV) ranking is exploited to proceed with a sequential test which generates a more accurate decision about the presence of phenomenon with fewer samples. Lastly, we carry out simulations on comparison of existing data fusion technologies and SCSS under dynamic Byzantine attack, and results verify the theoretical analysis and effectiveness of our proposed approach. We also conduct numerical analyses to demonstrate explicit impacts of secondary user (SU) density and mobility on the performance of SCSS.

摘要

协作频谱感知 (CSS) 被视为提高稀缺无线电频谱资源利用率的一种强大方法,但它受到拜占庭攻击的威胁。由于安全要求很高,拜占庭攻击已成为学术界和工业界的热门研究课题。广泛的研究主要旨在减轻拜占庭攻击对 CSS 的负面影响,但存在一些强假设,例如攻击者占少数或存在受信任的节点 (s) 进行数据融合,而对移动场景关注较少。本文专注于设计移动网络中 CSS 的通用可靠参考的问题。我们没有采用以前简化的攻击,而是从复杂的行为中开发了一个通用的拜占庭攻击模型,以进行各种攻击策略,并得出拜占庭攻击使融合中心 (FC) 失明的条件。具体来说,我们提出了一种针对动态拜占庭攻击的稳健顺序 CSS (SCSS)。我们提出的方法通过基于交付的评估来解决 FC 的不可靠性,以检查单个感测报告的一致性,并通过新颖的权重分配机制创新性地重用拜占庭的感测信息。此外,利用信任值 (TrV) 排名进行顺序测试,从而使用较少的样本更准确地判断现象的存在。最后,我们对现有数据融合技术和 SCSS 在动态拜占庭攻击下进行了仿真比较,结果验证了我们提出方法的理论分析和有效性。我们还进行了数值分析,以证明次要用户 (SU) 密度和移动性对 SCSS 性能的明确影响。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7d17/6033420/5d36a00a36ad/pone.0199546.g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7d17/6033420/a9ff12d86044/pone.0199546.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7d17/6033420/cae54a595c12/pone.0199546.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7d17/6033420/5a675dd0737d/pone.0199546.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7d17/6033420/e60be46470f7/pone.0199546.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7d17/6033420/bf4334bed57b/pone.0199546.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7d17/6033420/2ea053cd0eed/pone.0199546.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7d17/6033420/2fd7d1c04eee/pone.0199546.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7d17/6033420/cd1f36005ed7/pone.0199546.g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7d17/6033420/8e492ae25650/pone.0199546.g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7d17/6033420/8314f684cb82/pone.0199546.g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7d17/6033420/b898df25317c/pone.0199546.g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7d17/6033420/5d36a00a36ad/pone.0199546.g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7d17/6033420/a9ff12d86044/pone.0199546.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7d17/6033420/cae54a595c12/pone.0199546.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7d17/6033420/5a675dd0737d/pone.0199546.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7d17/6033420/e60be46470f7/pone.0199546.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7d17/6033420/bf4334bed57b/pone.0199546.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7d17/6033420/2ea053cd0eed/pone.0199546.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7d17/6033420/2fd7d1c04eee/pone.0199546.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7d17/6033420/cd1f36005ed7/pone.0199546.g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7d17/6033420/8e492ae25650/pone.0199546.g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7d17/6033420/8314f684cb82/pone.0199546.g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7d17/6033420/b898df25317c/pone.0199546.g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/7d17/6033420/5d36a00a36ad/pone.0199546.g012.jpg

相似文献

1
Sequential cooperative spectrum sensing in the presence of dynamic Byzantine attack for mobile networks.移动网络中存在动态拜占庭攻击时的顺序协作频谱感知。
PLoS One. 2018 Jul 5;13(7):e0199546. doi: 10.1371/journal.pone.0199546. eCollection 2018.
2
Securing Cooperative Spectrum Sensing Against Collusive SSDF Attack using XOR Distance Analysis in Cognitive Radio Networks.在认知无线电网络中使用异或距离分析防范针对勾结式频谱感知数据伪造攻击的协作频谱感知
Sensors (Basel). 2018 Jan 27;18(2):370. doi: 10.3390/s18020370.
3
History based forward and feedback mechanism in cooperative spectrum sensing including malicious users in cognitive radio network.认知无线电网络中包含恶意用户的协作频谱感知中基于历史的前馈和反馈机制。
PLoS One. 2017 Aug 18;12(8):e0183387. doi: 10.1371/journal.pone.0183387. eCollection 2017.
4
Secure cooperative spectrum sensing for the cognitive radio network using nonuniform reliability.使用非均匀可靠性的认知无线电网络安全协作频谱感知
ScientificWorldJournal. 2014;2014:101809. doi: 10.1155/2014/101809. Epub 2014 Sep 11.
5
Analysis of Byzantine Attacks for Target Tracking in Wireless Sensor Networks.无线传感器网络中目标跟踪的拜占庭攻击分析
Sensors (Basel). 2019 Aug 5;19(15):3436. doi: 10.3390/s19153436.
6
Efficient Wideband Spectrum Sensing with Maximal Spectral Efficiency for LEO Mobile Satellite Systems.用于低地球轨道移动卫星系统的具有最大频谱效率的高效宽带频谱感知
Sensors (Basel). 2017 Jan 21;17(1):193. doi: 10.3390/s17010193.
7
Energy-Efficient Cooperative Spectrum Sensing Using Machine Learning Algorithm.基于机器学习算法的节能协作频谱感知
Sensors (Basel). 2022 Oct 27;22(21):8230. doi: 10.3390/s22218230.
8
A Quantization-Based Multibit Data Fusion Scheme for Cooperative Spectrum Sensing in Cognitive Radio Networks.一种用于认知无线电网络中协作频谱感知的基于量化的多比特数据融合方案。
Sensors (Basel). 2018 Feb 6;18(2):473. doi: 10.3390/s18020473.
9
UAV aided virtual cooperative spectrum sensing for cognitive radio networks.无人机辅助的认知无线电网络虚拟合作频谱感知。
PLoS One. 2023 Sep 5;18(9):e0291077. doi: 10.1371/journal.pone.0291077. eCollection 2023.
10
Secure Data Aggregation in Wireless Sensor Network-Fujisaki Okamoto(FO) Authentication Scheme against Sybil Attack.无线传感器网络中的安全数据聚合——针对女巫攻击的藤崎冈本(FO)认证方案
J Med Syst. 2017 Jul;41(7):107. doi: 10.1007/s10916-017-0743-2. Epub 2017 May 26.

引用本文的文献

1
Dynamic nonlinear control strategies for resilient heterogeneous vehicle platooning and handling Byzantine attacks in communication networks.用于弹性异构车辆编队及应对通信网络中拜占庭攻击的动态非线性控制策略
Heliyon. 2025 Jan 6;11(2):e41574. doi: 10.1016/j.heliyon.2024.e41574. eCollection 2025 Jan 30.
2
Securing consensus in fractional-order multi-agent systems: Algebraic approaches against Byzantine attacks.在分数阶多智能体系统中达成共识:针对拜占庭攻击的代数方法
Heliyon. 2024 Nov 13;10(22):e40335. doi: 10.1016/j.heliyon.2024.e40335. eCollection 2024 Nov 30.
3
UAV aided virtual cooperative spectrum sensing for cognitive radio networks.
无人机辅助的认知无线电网络虚拟合作频谱感知。
PLoS One. 2023 Sep 5;18(9):e0291077. doi: 10.1371/journal.pone.0291077. eCollection 2023.