Font Size: a A A

Research On Database-driven Cognitive Radio Network Security

Posted on:2019-04-04Degree:MasterType:Thesis
Country:ChinaCandidate:W ZhaoFull Text:PDF
GTID:2428330545486676Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Under the current fixed spectrum allocation policy,most primary spectrum are idle in the most of time and parts of the spectrum are getting more and more crowded,which can no longer satisfy the demands of the increasing wireless users.Because of the high cost of spectrum sensing,traditional cognitive radio is not easy to be deployed in reality,database-driven cognitive radio appeared.However,network security issues,including location privacy leak and GPS spoofing attack,are attracting more and more attention.This paper provided solutions to these two aspects of security risks.In the database-driven cognitive radio network,cognitive users obtain available spectrum by submitting their own location information,which will lead to the disclosure of cognitive user's location.In response to the above problem,this paper used the cuckoo filter to store the spectrum information.Cognitive users do not have to send location information,just query the double cuckoo filters sent by the database.Because the cuckoo filter itself has false positive probability,which will cause the cognitive users access to the online spectrum of the authorized users.This paper used double cuckoo filters to store available spectrum and non-available spectrum that meet cognitive user equipment respectively,the spectrum obtained from the available spectrum cuckoo filter by cognitive user needs to be confirmed once in the nonavailable spectrum cuckoo filter,which to solve the problem of location privacy leakage and to avoid the risk of accessing primary users' online spectrum.Simulation analysis shows that when the available spectrum percentage is 35%,the communication cost of this scheme is 1/2 of the original cuckoo filter scheme,and the computation cost of the database and the cognitive client are all within 2ms.In the database-driven cognitive radio network,cognitive users choose the available spectrum according to the location.However,the vulnerability of GPS causes cognitive users to be vulnerable to GPS spoofing attacks.In response to thisproblem,this paper used the base station as a reference to provide location validation for cognitive users.The database determines whether the location validation passes or not,and only provide available spectrum to the cognitive users who pass the location validation.Because of the fixed-size of the grid may lead to cognitive users can't get the location validation,this paper used a multi-grid system to improve the acquisition rate of location validation.As symmetric privacy proximity detection may reveal the location of cognitive users,this paper used asymmetric privacy proximity detection to protect the privacy of cognitive users.In the end,this paper merged the location validation into the double cuckoo filters privacy protection scheme,and calculated the computation cost of the overall scheme.Simulation analysis shows that the overall scheme computation cost of database and cognitive user both are less than 3ms.
Keywords/Search Tags:database-driven cognitive radio, location privacy, cuckoo filter, GPS spoofing, location validation
PDF Full Text Request
Related items