Weight sequential log-likelihood ratio detect algorithm with malicious users removing
Weight sequential log-likelihood ratio detect algorithm with malicious users removing作者机构:State Key Laboratory of Rail Traffic Control and Safety Beijing Jiaotong University Key Laboratory of Wireless Sensor Network & Communication Shanghai Institute of Microsystem and Information Technology Chinese Academy of Sciences
出 版 物:《The Journal of China Universities of Posts and Telecommunications》 (中国邮电高校学报(英文版))
年 卷 期:2013年第20卷第2期
页 面:60-65页
核心收录:
学科分类:080904[工学-电磁场与微波技术] 0810[工学-信息与通信工程] 0809[工学-电子科学与技术(可授工学、理学学位)] 08[工学] 080402[工学-测试计量技术及仪器] 0804[工学-仪器科学与技术] 081001[工学-通信与信息系统]
基 金:supported by the National Natural Science Foundation of China(61172073) the State Key Laboratory of Rail Traffic Control and Safety Beijing Jiaotong University(RCS2011ZT003) the Open Research Fund of Key Laboratory of Wireless Sensor Network & Communication,Chinese Academy of Sciences(2011005) the Fundamental Research Funds for the Central Universities of Ministry of Education of China(2013JBZ001,2012YJS129,2009JBM012) the Program for New Century Excellent Talents in University of Ministry of China(NCET-12-0766)
主 题:cognitive radio cooperative spectrum sensing data falsification attack weight sequential log-likelihood ratio detect
摘 要:Due to the openness of the cognitive radio network, spectrum sensing data falsification (SSDF) can attack the spectrum sensing easily, while there is no effective algorithm proposed in current research work, so this paper introduces the malicious users removing to the weight sequential probability radio test (WSPRT). The terminals' weight is weighted by the accuracy of their spectrum sensing information, which can also be used to detect the malicious user. If one terminal owns a low weight, it can be treated as malicious user, and should be removed from the aggregation center. Simulation results show that the improved WSPRT can achieve higher performance compared with the other two conventional sequential detection methods under different number of malicious users.