浏览全部资源
扫码关注微信
1. 西安邮电大学通信与信息工程学院,陕西 西安710121
2. 西安邮电大学陕西省信息通信网络及安全重点实验室,陕西 西安710121
3. 中国科学院信息安全国家重点实验室,北京100093
[ "冯景瑜(1984-),男,甘肃陇南人,博士,西安邮电大学副教授,主要研究方向为无线通信安全、认知无线网络等。" ]
[ "杜续(1989-),男,河南郑州人,西安邮电大学硕士生,主要研究方向为无线通信、数据分析等。" ]
[ "王宏刚(1977-),男,陕西宝鸡人,博士,西安邮电大学讲师,主要研究方向为无线通信、超高频RFID等。" ]
[ "黄文华(1980-),女,江苏江阴人,西安邮电大学副教授,主要研究方向为网络安全风险评估。" ]
网络出版日期:2016-10,
纸质出版日期:2016-10-25
移动端阅览
冯景瑜, 杜续, 王宏刚, 等. 认知ad hoc网络中的多信道路由安全威胁及其对策研究[J]. 通信学报, 2016,37(Z1):92-97.
Jing-yu FENG, Xu DU, Hong-gang WANG, et al. Research on multi-channel routing threats and defense for cognitive ad hoc network[J]. Journal on communications, 2016, 37(Z1): 92-97.
冯景瑜, 杜续, 王宏刚, 等. 认知ad hoc网络中的多信道路由安全威胁及其对策研究[J]. 通信学报, 2016,37(Z1):92-97. DOI: 10.11959/j.issn.1000-436x.2016253.
Jing-yu FENG, Xu DU, Hong-gang WANG, et al. Research on multi-channel routing threats and defense for cognitive ad hoc network[J]. Journal on communications, 2016, 37(Z1): 92-97. DOI: 10.11959/j.issn.1000-436x.2016253.
在日趋紧张的频谱资源环境中,不依赖固定基础设施和固定频谱分配策略的认知ad hoc网络相关技术已经获得了十分迅速的发展。但是,认知ad hoc网络的多信道路由特点使其收益与风险并存,面临着严重的安全威胁困扰。为深入理解多信道路由安全威胁,掌握其防御对策的研究现状及发展趋势,从节点路由和多信道选择这2个层面细化出具体的威胁类型,归纳目前的典型防御对策,总结出保障认知ad hoc网络安全的首要前提是在认知节点之间建立信任关系,而信任管理正是解决多信道路由安全威胁的基础。最后,针对目前多信道路由及其防御对策研究中存在的亟待解决问题,明确了一些有待继续研究的方向。
In the environment of scarce spectrum resources
cognitive ad hoc network which is independent with infrastruc-ture and fixed spectrum allocation policy
has been also developed quickly.Due to the characteristic of multi-channel routing
cognitive ad hoc network is commonly perceived as an environment offering both opportunities and threats.To further un-derstand the multi-channel routing threats
the current research situation and development trend
the types of threats were analyzed in terms of the node routing and the multi-channel selection
and several typical security methods were concluded.Meanwhile
the most important solution to keep the security of cognitive radio network was found to build trust relationship among cognitive users.Trust management was just the basic technology to solve the security problems of multi-channel routing.Finally
the current problems of related works and research trends in this area were discussed.
SHAH M A , ZHANG S . A novel multi-fold security framework for cognitive radio wireless ad-hoc networks [C]//The IEEE 18th In-ternational Conference on Automation and Computing . 2012 : 1 - 6 .
AKYILDIZ I F , LEE W Y , CHOWDHURY K R . CRAHNs:cognitive radio ad hoc networks [J ] . Ad Hoc Networks , 2009 , 7 ( 5 ): 810 - 836 .
JEON W S , HAN J A , JEONG D G . A novel MAC scheme for mul-tichannel cognitive radio ad hoc networks [J ] . IEEE Transactions on Mobile Computing , 2012 , 11 ( 6 ): 922 - 934 .
CACCIAPUOTIA A S , CALEFFIA M , PAURA L . Reactive routing for mobile cognitive radio ad hoc networks [J ] . Ad Hoc Networks , 2012 , 10 ( 5 ): 803 - 815 .
AKYILDIZ I F , LO B F , BALAKRISHNAN R . Cooperative spectrum sensing in cognitive radio networks:a survey [J ] . Physical Communi-cation , 2011 , 4 ( 1 ): 40 - 62 .
CHEN R L , PARK J M , HOU Y T . Toward secure distributed spectrum sensing in cognitive radio networks [J ] . IEEE Communications Maga-zine , 2008 , 46 ( 4 ): 50 - 55 .
CARVALHO M . Security in mobile ad hoc networks [J ] . IEEE Secu-rity & Privacy , 2008 , 6 : 72 - 75 .
王梅 , 吴蒙 . MANET 中常见的路由安全威胁及相应解决方案 [J ] . 通信学报 , 2005 , 26 ( 5 ): 106 - 112 .
WANG M , WU M . Dominating security threats in MANET and their corresponding solutions [J ] . ournal on Communications , 2005 , 26 ( 5 ): 106 - 112 .
RICHARD F , HUANG M Y , TANG H . Biologically inspired consen-sus-based spectrum sensing in mobile ad hoc networks with cognitive radios [J ] . IEEE Network , 2010 , 24 ( 3 ): 26 - 30 .
LI S , ZHU H J , YANG B , et al . Towards a game theoretical modeling of rational collaborative spectrum sensing in cognitive radio net-works[C]//The IEEE International Conference on Communication . 2012 : 1 - 5 .
冯景瑜 . 协作频谱感知中的SSDF攻击及其对策研究 [J ] . 电信科学 , 2014 , 30 ( 1 ): 67 - 72 .
FENG J Y . Research on SSDF attack and defense for cooperative spectrum sensing [J ] . Telecommunications Science , 2014 , 30 ( 1 ): 67 - 72 .
BLAZE M , FEIGENBANM J , STRAUSS M . Compliance checking in the PolicyMaker trust management system[C]//The International Con-ference on Financial Cryptography Springer-Verlag . 1998 : 254 - 274 .
LI X Y , ZHOU F , YANG X D . Scalable feedback aggregating (SFA) overlay for large-scale P2P trust management [J ] . IEEE Transactions on Parallel and Distributed Systems , 2012 , 23 ( 10 ): 1944 - 1957 .
BOUKERCHE A , REN Y , PAZZI R W . An adaptive computational trust model for mobile ad hoc networks[C]//2009 International Con-ference on Wireless Communications and Mobile Computing . 2009 : 191 - 195 .
GANERIWAL S , BALZANO L K , SRIVASTAVA M B . Reputa-tion-based framework for high integrity sensor networks [J ] . ACM Transactions on Sensor Networks , 2008 ( 4 ): 1 - 37 .
乔秀全 , 杨春 , 李晓峰 , 等 . 社交网络服务中一种基于用户上下文的信任度计算方法 [J ] . 计算机学报 , 2011 , 34 ( 12 ): 2406 - 2413 .
QIAO X Q , YANG C , LI X F , et al . A trust calculating algorithm based on social networking service users' context [J ] . Chinese Journal of Computers , 2011 , 34 ( 12 ): 2406 - 2413 .
刘文懋 , 殷丽华 , 方滨兴 , 等 . 物联网环境下的信任机制研究 [J ] . 计算机学报 , 2012 , 35 ( 5 ): 846 - 855 .
LIU W M , YIN L H , FANG B X , et al . A hierarchical trust model for the Internet of things [J ] . Chinese Journal of Computers , 2012 , 35 ( 5 ): 846 - 855 .
YU F R , TANG H , HUANG M , , et al . Distributed cooperative spec-trum sensing in mobile ad hoc networks with cognitive radios [J ] . Mathematics , 2011 ( 3 ): 26 - 30 .
MARTI S , GIULI T J , LAI K , et al . Mitigating routing misbehavior in mobile ad hoc networks[C]//The Proceedings of the 6th Annual Inter-national Conference on Mobile Computing and Networking . 2000 : 255 - 265 .
GUHA R , GIULI R , RAGHAVAN P , et al . Propagation of trust and distrust[C]//The 13th International Conference on World Wide Web . 2004 : 403 - 412 .
BUCHEGGER S , BOUDEC J Y . A robust reputation system for P2P and mobile ad hoc networks[C]//2nd Workshop on Economics of Peer-to-Peer Systems . 2004 : 1 - 6 .
许智君 , 胡琪 , 张玉军 , 等 . MANET网络激励节点协作的信任评估路由协议 [J ] . 通信学报 , 2012 , 7 ( 9 ): 27 - 35 .
XU Z J , HU Q , ZHANG Y J , et al . Trust evaluation routing protocol to enforce cooperation in mobile ad hoc networks [J ] . Journal on Com-munications , 2012 , 7 ( 9 ): 27 - 35 .
QIN T , YU H , LEUNG C , et al . Towards a trust aware cognitive radio architecture [J ] . ACM Sigmobile Mobile Computing and Communica-tions Review , 2009 , 13 ( 2 ): 86 - 95 .
ZENG K , PAWELCZAK P , CABRIC D . Reputation-based cooperative spectrum sensing with trusted nodes assistance [J ] . IEEE Communica-tion Letters , 2010 , 14 ( 03 ): 226 - 228 .
闫琦 , 杨家玮 , 张雯 . 认知无线电网络中安全的合作频谱感知 [J ] . 北京邮电大学学报 , 2011 , 34 ( 2 ): 71 - 7 .
YAN Q , YANG J W , ZHANG W . The sensing of the secure coopera-tive spectrum in cognitive radio networks [J ] . Journal of Beijing Uni-versity of Posts and Telecommunications , 2011 , 34 ( 2 ): 71 - 7 .
FENG J Y , LU G Y , MIN X C . Social incentives for cooperative spec-trum sensing in distributed cognitive radio networks [J ] . KSII Transac-tions on Internet and Information Systems , 2014 , 8 ( 2 ): 355 - 369 .
FENG J Y , ZHANG Y Q , LU G Y , et al . Securing cooperative spec-trum sensing against ISSDF attack using dynamic trust evaluation in cognitive radio networks [J ] . Security and Communication Networks , 2015 , 8 ( 17 ): 3157 - 3166 .
FENG J Y , ZHANG Y Q , WANG H G , et al . Supporting secure spec-trum sensing data transmission against SSDH attack in cognitive radio ad hoc networks [J ] . Journal of Network and Computer Applications , 2016 , 72 ( 9 ): 140 - 149 .
0
浏览量
620
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构