J4 ›› 2015, Vol. 42 ›› Issue (1): 29-34.doi: 10.3969/j.issn.1001-2400.2015.01.005

• 研究论文 • 上一篇    下一篇

一种行为信任模糊评估模型

张光华1,2;张玉清1,3;刘雪峰1,3;燕敬博1,3
  

  1. (1. 西安电子科技大学 综合业务网理论及关键技术国家重点实验室,陕西 西安  710071;
    2. 河北科技大学 信息科学与工程学院,河北 石家庄  050018;
    3. 中国科学院研究生院 国家计算机网络入侵防范中心,北京  100043)
  • 收稿日期:2013-06-30 出版日期:2015-02-20 发布日期:2015-04-14
  • 作者简介:张光华(1979-),男,西安电子科技大学博士研究生,E-mail:xian_software@163.com.
  • 基金资助:

    国家自然科学基金资助项目(61300120,61301091);河北省教育厅高等学校科学研究优秀青年基金资助项目(YQ2014036)

Behavior trust fuzzy evaluation model

ZHANG Guanghua1,2;ZHANG Yuqing1,3;LIU Xuefeng1,3;YAN Jingbo1,3   

  1. (1. State Key Lab. of Integrated Service Networks, Xidian Univ., Xi'an  710071, China;
    2. College of Information Science and Engineering, Hebei Univ. of Science and Technology, Shijiazhuang  050018, China;
    3. National Computer Network Intrusion Protection Center, GUCAS, Beijing  100043, China)
  • Received:2013-06-30 Online:2015-02-20 Published:2015-04-14

摘要:

针对认知无线电网络中反馈虚假频谱信息和强占频谱资源的恶意行为,提出一种行为信任模糊评估模型.把频谱感知行为和频谱使用行为作为两个评价因素,基于信任的主观性和不确定性使用模糊综合评判决策方法构建节点的信任评价.在合作频谱感知中,基于综合评判结果识别恶意节点以消除虚假反馈信息;在频谱分配中,使用模糊集合之间的格贴近度定义,计算实际综合评判集与理想综合评判集之间的差异,以此量化非恶意节点的可信程度,并结合多目标优化算法确定分配给节点的频谱资源.以上机制抑制了节点的恶意行为,激励了节点的合作行为,实现了物理层的频谱感知和MAC层的频谱分配的联合设计.仿真结果及分析表明,在恶意攻击下,该模型较已有模型在系统的感知性能、吞吐量和频谱分配的公平性方面都有较好的表现.

关键词: 模糊理论, 信任, 频谱感知, 频谱分配

Abstract:

To cope with malicious behavior in cognitive radio networks such as providing false spectrum information and seizing spectrum resources, this paper proposes a behavior trust fuzzy evaluation model. With spectrum sensing behavior and spectrum utilization behavior as two evaluation factors, this model implements nodes' trust evaluation using the fuzzy comprehensive evaluation and decision method based on subjectivity and uncertainty of trust. In cooperative spectrum sensing, this model identifies malicious nodes based on the result of comprehensive evaluation to eliminate false feedback. In spectrum allocation, this model uses the definition of the lattice degree of nearness between fuzzy sets to calculate the difference between the actual comprehensive evaluation set and the ideal comprehensive evaluation set, and thereby quantifies the trustworthiness of non-malicious nodes and, combining with the multi-target optimization algorithm, determines the spectrum resources to be allocated to these nodes. This mechanism inhibits malicious behavior while encouraging cooperative behavior of nodes, thus achieving a joint design for spectrum sensing at the physical layer and spectrum allocation at the MAC layer. Simulation results and analysis show that the proposed model outperforms existing models in the system's sensing performance, throughput and fairness of spectrum allocation under malicious attacks.

Key words: fuzzy theory, trust, spectrum sensing, spectrum allocation

中图分类号: 

  • TP393