J4 ›› 2015, Vol. 42 ›› Issue (1): 29-34.doi: 10.3969/j.issn.1001-2400.2015.01.005

• Original Articles • Previous Articles     Next Articles

Behavior trust fuzzy evaluation model

ZHANG Guanghua1,2;ZHANG Yuqing1,3;LIU Xuefeng1,3;YAN Jingbo1,3   

  1. (1. State Key Lab. of Integrated Service Networks, Xidian Univ., Xi'an  710071, China;
    2. College of Information Science and Engineering, Hebei Univ. of Science and Technology, Shijiazhuang  050018, China;
    3. National Computer Network Intrusion Protection Center, GUCAS, Beijing  100043, China)
  • Received:2013-06-30 Online:2015-02-20 Published:2015-04-14
  • Contact: ZHANG Guanghua E-mail:xian_software@163.com

Abstract:

To cope with malicious behavior in cognitive radio networks such as providing false spectrum information and seizing spectrum resources, this paper proposes a behavior trust fuzzy evaluation model. With spectrum sensing behavior and spectrum utilization behavior as two evaluation factors, this model implements nodes' trust evaluation using the fuzzy comprehensive evaluation and decision method based on subjectivity and uncertainty of trust. In cooperative spectrum sensing, this model identifies malicious nodes based on the result of comprehensive evaluation to eliminate false feedback. In spectrum allocation, this model uses the definition of the lattice degree of nearness between fuzzy sets to calculate the difference between the actual comprehensive evaluation set and the ideal comprehensive evaluation set, and thereby quantifies the trustworthiness of non-malicious nodes and, combining with the multi-target optimization algorithm, determines the spectrum resources to be allocated to these nodes. This mechanism inhibits malicious behavior while encouraging cooperative behavior of nodes, thus achieving a joint design for spectrum sensing at the physical layer and spectrum allocation at the MAC layer. Simulation results and analysis show that the proposed model outperforms existing models in the system's sensing performance, throughput and fairness of spectrum allocation under malicious attacks.

Key words: fuzzy theory, trust, spectrum sensing, spectrum allocation

CLC Number: 

  • TP393