TY - GEN
T1 - Research on Anti PUE attack based on CAF spectrum and repeated-game
AU - Chang, Hong
AU - Li, Yong
N1 - Publisher Copyright:
© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2018.
PY - 2018
Y1 - 2018
N2 - High imitation of primary user (PU) signal, primary user emulation (PUE) signal is difficulty for discrimination. First, a method based on cross ambiguity function (CAF) is proposed for determining PUE signal. For PUE signal different from PU signal in spatial but same in frequency in one sensing slot, the algorithm with two dimension search is reduced to one dimension search, having no inter-modulation signal influence. Moreover, for defending PUE attack (PUEA), a repeated game between malicious user (MU) and secondary user (SU) is formulated. By introducing credit discipline mechanism, the optimal strategies for both players are investigated. The stability of the strategies is analyzed with replicated dynamic equation, which indicates that the strategies are the final choice no matter what initial strategies they choose. Simulation results demonstrate that the method is effective for discriminating and defending PUEA in terms of lower computation, higher detection probability and greater payoff.
AB - High imitation of primary user (PU) signal, primary user emulation (PUE) signal is difficulty for discrimination. First, a method based on cross ambiguity function (CAF) is proposed for determining PUE signal. For PUE signal different from PU signal in spatial but same in frequency in one sensing slot, the algorithm with two dimension search is reduced to one dimension search, having no inter-modulation signal influence. Moreover, for defending PUE attack (PUEA), a repeated game between malicious user (MU) and secondary user (SU) is formulated. By introducing credit discipline mechanism, the optimal strategies for both players are investigated. The stability of the strategies is analyzed with replicated dynamic equation, which indicates that the strategies are the final choice no matter what initial strategies they choose. Simulation results demonstrate that the method is effective for discriminating and defending PUEA in terms of lower computation, higher detection probability and greater payoff.
KW - Credit discipline mechanism
KW - Cross ambiguity function
KW - PUE attack
KW - Repeated game
KW - Replicated dynamic equation
UR - http://www.scopus.com/inward/record.url?scp=85045305092&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-78139-6_45
DO - 10.1007/978-3-319-78139-6_45
M3 - 会议稿件
AN - SCOPUS:85045305092
SN - 9783319781389
T3 - Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
SP - 450
EP - 462
BT - Communications and Networking - 12th International Conference, ChinaCom 2017, Proceedings
A2 - Li, Bo
A2 - Zeng, Deze
A2 - Shu, Lei
PB - Springer Verlag
T2 - 12th International Conference on Communications and Networking in China, CHINACOM 2017
Y2 - 10 October 2017 through 12 October 2017
ER -