| 研究生: |
高偉哲 Kao, Wei-Che |
|---|---|
| 論文名稱: |
在感知無線電網路中以通道特徵為基礎並考慮同步問題之偵測模仿主要使用者攻擊 Channel-Based Detection of Primary User Emulation Attacks Considering Synchronization in Cognitive Radio Networks |
| 指導教授: |
卿文龍
Chin, Wen-Long |
| 學位類別: |
碩士 Master |
| 系所名稱: |
工學院 - 工程科學系 Department of Engineering Science |
| 論文出版年: | 2012 |
| 畢業學年度: | 100 |
| 語文別: | 中文 |
| 論文頁數: | 71 |
| 中文關鍵詞: | 感知無線電 、模仿主要使用者攻擊 、正交分頻多工 、實體層 、無線電指紋 |
| 外文關鍵詞: | Cognitive Radio, Primary User Emulation Attacks, Orthogonal Frequency Division Multiplexing, Physical Layers, Radio Fingerprint |
| 相關次數: | 點閱:100 下載:2 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
現今感知無線電(cognitive radio, CR)被認為是解決頻譜使用效率不佳的重要技術,然而此技術也衍伸出值得探討的安全性問題,其中較為人所研究的攻擊是模仿主要使用者攻擊(primary user emulation attack, PUEA),本論文提出利用無線通道的統計特性辨識模仿主要使用者攻擊。在無線環境下,不同的接收端與傳送端之間的通道統計特性都是獨一無二的,因此可以將此特性當作是一種無線電指紋(radio fingerprint)來使用,藉由此方法可以在實體層先行認證,進而減少認證時間。此外論文提出利用感知無線電的跨層級智慧學習能力,使高準確性的上層認證建立出通道統計特性的資料庫,幫助實體層認證。然而實體層認證雖可以快速辨識傳送端身分,但考慮某些情況下單一節點偵測可能受到許多因素影響偵測結果,這裡提出合作式偵測,並分析合作式偵測效能。模擬結果驗證本論文所提出方法的可行性。
Cognitive radio (CR) today refers to a relatively wide range of technologies for making wireless systems computationally intelligent, with a view to improving the spectral utilization. However, CR also raises new security issues, the most of which concerns primary user emulation attack (PUEA). This work proposes a method by using the characteristics of wireless channels to identify the PUEA. In a wireless environment, the statistical properties of the wireless channel between the receiver and transmitter are unique. They can therefore be utilized as a radio fingerprint to authenticate directly users via physical (PHY) layers, thereby improving detection time. Before the PHY layer detection is introduced, the cross-layer intelligent learning ability of CR is exploited to establish a detection database by utilizing the accuracy of higher layer authentications. Although the transmitter can be rapidly identified using the proposed detection mechanism, several factors may affect the result of detection by a single node. Therefore, the cooperative detection scheme is adopted herein to improve the detection performance. The detection probability is analyzed. Simulation results confirm the advantages of the proposed schemes.
[1]Federal Communication Commission. Cognitive radio technologies proceeding (CRTP).[Online]. Available: http://www.fcc.gov/oet/cognitiveradio/
[2]林高淵,“感知無線電之運用與發展”, 中華民國電子零件認證委員會, IECQ報導第五十二期, 2008.
[3]J. Mitola,“Cognitive radio,”Licentiate proposal, KTH, Stockholm, Sweden.
[4]Q. Zhao and B. M. Sadler,“A survey of dynamic spectrum access: signal processing, networking, and regulatory policy,”IEEE Signal Processing Mag., vol. 4, no. 3, pp. 79-89, May 2007.
[5]S. Haykin,“Cognitive radio: brain-empowered wireless communication,”IEEE J. Sel. Areas Commum., vol. 23, no. 2, pp.201-220, Feb. 2005.
[6]I. F. Akyildiz, W. Lee, M. C. Vuran, and S. Mohanty,“Next generation/dynamic spectrum access/cognitive radio wireless networks: A survey,” Computer Networks, vol. 50, pp. 2127-2159, 2006.
[7]A. M. Wyglinski, M. Nekovee, and Y. Thomas Hou,“Cognitive radio communication and networks, ”Academic press, 2009.
[8]S. Anad, Z. Jin, and K. P. Subbalakshmi,“An analytical model for primary user emulation attacks in cognitive radio networks,”Proc. IEEE DySPAN, Oct. 2008.
[9]W. Wang,“Denial of service attacks in cognitive radio networks,” Proc. IEEE ESIAT, Jul. 2010.
[10]J. L. Burbank,“Security in cognitive radio networks: The required evolution in approaches to wireless network security,”Proc. IEEE CROWNCOM, pp.1-7, May 2008.
[11]T. C. Clancy, N. Goergen,“Security in cognitive radio networks: Threats and mitigation,”Proc. IEEE CROWNCOM, pp.1-8, May 2008.
[12]R. Chen, J. M. Park, and J. H. Reed,“Defense against primary user emulation attacks in cognitive radio networks,” IEEE J. Sel. Areas Commum., vol. 26, no. 1, pp. 25-37, Jan.2008.
[13]C. Cordeiro et al.,“IEEE 802.22: The first worldwide wireless standard based on cognitive radios” IEEE DySPAN, pp. 328-337, Nov. 2005.
[14]Federal Communication Commission,“Notice for proposed rulemaking (NPRM 03-322): Facilitating opportunities for flexible efficient, and reliable spectrum use employing cognitive radio technologies,”ET Docket, no. 03-108, Dec. 2003.
[15]Z. Chen, T. Cooklev, C. Chen, P. R. Carlos,“Modeling primary user emulation attacks and defenses in cognitive radio networks,”Proc. IEEE IPCCC, pp. 208-215, Dec. 2009.
[16]S. Chaudhari, V. Koivunen, H. V. Poor,“Autocorrelation-based decentralized sequential detection of OFDM signals in cognitive radios,”IEEE Trans. Signal Process., vol. 57, no. 7, pp.2690-2700, Jul. 2009.
[17]W. L. Chin,“ML estimation of timing and frequency offsets using distinctive correlation characteristics of OFDM signals over dispersive fading channels,”IEEE Trans. Veh. Technol., vol. 60 no. 2, pp. 444-456, Feb. 2011.
[18]J. J. van de Beek, M. Sandell, and P. O. Borjesson,“ML estimation of time and frequency offset in OFDM system,”IEEE Trans. Signal Process., vol. 45, no. 7, pp.1800-1805, Jul. 1997.
[19]H. L. Van Trees, Detection, Estimation, and Modulation Theory, New York: Wiley, 1968.
[20]Guideline for Evaluation of Radio Transmission Technologies for IMT-2000, Recommendation ITU-R M. 1225, 1997.
[21]M. P.Olivieri, G. Barnett, A. Lackpour, A. Davis, P. Ngo,“A scalable dynamic spectrum allocation system with interference mitigation for teams of spectrally agile software defined radios” IEEE DySPAN, pp.170-179, Nov. 2005.
[22]K. Challapali, S. Mangold, and Z. Zhong,“Spectrum agile radio: Detecting spectrum opportunities,”in proceedings of the Sixth Annual International Symposium on Advanced Radio Technologies, Mar. 2004.
[23]T. W. Anderson,“Introduction to multivariate statistical analysis,”New York: John Wiley and Sons, 1958.
[24]曾俊霖,“Channel-based detection of primary user emulation attacks in cognitive radios, ”國立成功大學工程科學系碩士論文, 2011.
[25]A. Wald,“Sequential test of statistical hypothesis”Ann. Math. Stat., vol. 16, no 2, pp.117-186, Jun. 1945.
[26]A. B. Salberg, and A. Swami,“Doppler and Frequency-Offset Synchronization in Wideband OFDM”IEEE Trans. Commum., vol. 4, no. 6, pp 2870-2881, Nov. 2005.