CORC  > 厦门大学  > 信息技术-会议论文
Detecting identity-spoof attack based on BP network in cognitive radio network
Kang, Shan ; Chen, Naiwen ; Yan, Mi ; Chen, Xiaoxiao ; Kang S(康姗)
2011
关键词Backpropagation Radio Radio broadcasting Radio systems Telecommunication networks User interfaces Wireless telecommunication systems
英文摘要Conference Name:2011 Cross Strait Quad-Regional Radio Science and Wireless Technology Conference, CSQRWC 2011. Conference Address: Harbin, China. Time:July 27, 2011 - July 30, 2011.; In the cognitive radio network (CRN), all the cognitive user opportunistic access the spectrum, so it can improve the spectrum utilization. As a smart spectrum sharing technology, cognitive radio can change its transmitter parameter based on interactive the environment where it operates. So the MAC address can be easy spoofed in the open air. An attacker can exploit this character to preempt spectrum resources and bring the negative impact to the network. In this paper, we propose a scheme of detecting identity-spoof attack based on Back Propagation (BP) network. The scheme extracts the fingerprint feature of cognitive user to get the received signal strength (RSS). The extracted Eigen values can be used as the input vectors of the BP neural network which are trained by the honest users' RSS. The honest users and the attackers can be divided into two categories by the trained BP network to detect an identity-spoof attack. Simulation result shows that our scheme can effectively detect identity-spoof attack with a low false alarm rate and miss alarm rate. ? 2011 IEEE.
语种英语
出处http://dx.doi.org/10.1109/CSQRWC.2011.6037280
出版者IEEE Computer Society
内容类型其他
源URL[http://dspace.xmu.edu.cn/handle/2288/86975]  
专题信息技术-会议论文
推荐引用方式
GB/T 7714
Kang, Shan,Chen, Naiwen,Yan, Mi,et al. Detecting identity-spoof attack based on BP network in cognitive radio network. 2011-01-01.
个性服务
查看访问统计
相关权益政策
暂无数据
收藏/分享
所有评论 (0)
暂无评论
 

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。


©版权所有 ©2017 CSpace - Powered by CSpace