The terrestrial satellite network will play an essential role in 6G. Through the satellite system, people can obtain a lot of ground image information to process tasks and feedback. Forest resource is an essential res...
详细信息
With the development of 6G technology, security and privacy have become extremely important in the face of larger network traffic bandwidth. An effective intrusion detection system can deal with the network attacks. D...
详细信息
Aiming at the modulation recognition problem of mixed signal set {BPSK, QPSK, BPSK-FM, QPSK-FM} with unknown parameters, this paper proposes a modulation recognition algorithm based on two-fold PLL (phase locked loop)...
详细信息
Cognitive Radio (CR) is considered as an effective technology for alleviating the spectrum shortage problem by enabling secondary users to utilize vacant spectrum allocated to a primary user (PU). IEEE 802.22 which is...
详细信息
Cognitive Radio (CR) is considered as an effective technology for alleviating the spectrum shortage problem by enabling secondary users to utilize vacant spectrum allocated to a primary user (PU). IEEE 802.22 which is the first standard based on CR is developed to increase the efficiency of TV bands. However the physical layer security of IEEE 802.22 has been studied rarely. In this paper, we propose a scheme to sense the specific primary user for dealing with Primary User Emulation (PUE) Attack which is a possible threat to wireless security. According to ATSC digital TV which is one of the important PUs, we estimate the accuracies of pilot and symbol rate as RF fingerprint (RFF), and Support Vector Data Description (SVDD) is introduced to sense the fine differences of RFF to distinguish PUE attacker from PU. The simulation results show that the proposed scheme is feasible to verify the PUE attacker at a relative high SNR level.
This paper sums up four security factors after analyzing co-residency threats caused by the special multitenant environment in the *** secure the factors,a multiway dynamic trust chain transfer model was proposed on t...
详细信息
This paper sums up four security factors after analyzing co-residency threats caused by the special multitenant environment in the *** secure the factors,a multiway dynamic trust chain transfer model was proposed on the basis of a measurement interactive virtual machine and current behavior to protect the integrity of the system.A trust chain construction module is designed in a virtual machine *** dynamic monitoring,it achieves the purpose of transferring integrity between virtual machine.A cloud system with a trust authentication function is implemented on the basis of the model,and its practicability is shown.
In cognitive radio networks, when a primary user reoccupies the channel, cognitive radios (CRs) need to vacate the channel and reestablish a link on some other channel to avoid interference to primary users, resulting...
详细信息
In cognitive radio networks, when a primary user reoccupies the channel, cognitive radios (CRs) need to vacate the channel and reestablish a link on some other channel to avoid interference to primary users, resulting in spectrum handoff. A joint spectrum handoff delay and link maintenance optimization problem for spectrum handoff is formulated in this paper. A binary shuffled frog leaping algorithm (SFLA) based algorithm is proposed to solve this problem. Simulations show that the proposed algorithm performs far better than random target channel visiting scheme. It can obtain solutions with low handoff delay and low probability of handoff failure which are very close to the optimal solutions.
Wideband spectrum sensing is a fundamental problem in cognitive radio networks. In this paper, a wideband spectrum sensing procedure which consists of four steps, i.e., coarse support recovery, fine binary detection, ...
详细信息
Wideband spectrum sensing is a fundamental problem in cognitive radio networks. In this paper, a wideband spectrum sensing procedure which consists of four steps, i.e., coarse support recovery, fine binary detection, band edges detection and clustering, for modulated wideband converter (MWC) based cognitive radio system at sub-Nyquist rate is proposed. Simulations show that with a sub-Nyquist sampling rate, the proposed spectrum sensing procedure can locate spectrum holes correctly.
Spectrum sensing is one of the fundamental problems for cognitive radio. In cognitive radio networks, cognitive radios can cooperatively sense the spectrum to detect the presence of primary users with higher sensitivi...
详细信息
Spectrum sensing is one of the fundamental problems for cognitive radio. In cognitive radio networks, cognitive radios can cooperatively sense the spectrum to detect the presence of primary users with higher sensitivity. This paper proposes distributed consensus algorithms for decision fusion based cooperative spectrum sensing. Both theoretical analysis and simulations are performed to show the convergence property of the algorithms. Results show that the proposed algorithms can realize central OR, AND, and M-out-of-n decision fusion rules by locally exchanging information among each radio and its adjacent neighbors in a distributed way.
Since the advancement of mobile communicationtechnology, traditional industries are gradually transforming and upgrading, which leads to problems such as insufficient computing resources and excessive energy consumpt...
详细信息
The military strategic guideline under the new situation points out that the base point of future war preparation is to win the informationized war mainly from the direction of unmanned cluster. Routing protocol is an...
详细信息
暂无评论