信息网络安全 ›› 2020, Vol. 20 ›› Issue (1): 40-45.doi: 10.3969/j.issn.1671-1122.2020.01.006

• 技术研究 • 上一篇    下一篇

基于功率控制与中继协作的抗窃听攻击模型

李瑞兴1,2,3(), 许力1,3, 方禾1,3   

  1. 1. 福建师范大学网络安全与密码技术重点实验室,福州 350007
    2. 闽江师范高等专科学校计算机系,福州 350108
    3. 物联网福建省高校应用技术工程中心,福州 350108
  • 收稿日期:2019-09-02 出版日期:2020-01-10 发布日期:2020-05-11
  • 作者简介:

    作者简介:李瑞兴(1962—),男,福建,副教授,本科,主要研究方向为网络信息安全、无线网络与物联网;许力(1970—),男,福建,教授,博士,主要研究方向为网络与信息安全、无线网络与通信、云计算与物联网等;方禾(1991—),女,福建,博士研究生,主要研究方向为网络信息安全、物理层安全。

  • 基金资助:
    国家自然科学基金[61771140, U1905211];福州市科技重大项目[榕科(2017)325号]

Anti-eavesdropping Attack Model Based on Power Control and Relay Cooperation

LI Ruixing1,2,3(), XU Li1,3, FANG He1,3   

  1. 1. Key Laboratory of Network Security and Cryptography, Fujian Normal University, Fuzhou 350007, China
    2. Department of Computer Science, Minjiang Teachers College, Fuzhou 350108
    3. Fujian College Applied Technology Engineering Center of Internet of Things, Fuzhou 350108, China
  • Received:2019-09-02 Online:2020-01-10 Published:2020-05-11

摘要:

在认知无线电网络中,由于无线通信的广播特性,容易造成链路被恶意窃听。文章首先分析主用户(授权用户)网络中直接传输下窃听概率与功率的关系。接着提出基于功率控制与中继协作的抗窃听攻击模型,计算两种不同情形下的最佳传输功率。第一种情形为窃听者只能窃听中继节点的信号,第二种情形为窃听者可以同时从源节点和中继节点窃听到信息。最后,文章通过分析安全容量给出最佳中继的选择标准。数值分析结果表明,文章模型可以通过增加中继节点的个数来降低窃听概率。此外,相较于其他模型,文章模型在抵御窃听攻击方面能达到更优的效果。

关键词: 认知无线电网络, 窃听攻击, 中继技术, 功率控制

Abstract:

In cognitive radio networks, it is easy to cause malicious links eavesdropping because of the broadcast characteristics. Firstly, this paper analyzes the relationship between eavesdropping probability and transmit power in the primary user (license user) network. Then this paper proposes an anti-eavesdropping attack model based on power control and relay cooperation, and calculates the optimal transmission powers in two different cases. One case is that the eavesdropper can only eavesdrop the signals of the relay nodes, another one is that the eavesdropper can eavesdrop the information from the source node and the relay nodes at the same time. Finally, this paper gives the selection criteria of the best relay nodes by analyzing the security capacity. The simulation results show that the model can reduce the eavesdropping probability by increasing the number of relay nodes. In addition, compared with other models, the model can achieve better results in resisting eavesdropping attacks.

Key words: cognitive radio network, eavesdropping attack, relay technology, power control

中图分类号: