RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
        • 주제분류
        • 발행연도
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        Throughput and Interference for Cooperative Spectrum Sensing: A Malicious Perspective

        ( Jipeng Gan ),( Jun Wu ),( Jia Zhang ),( Zehao Chen ),( Ze Chen ) 한국인터넷정보학회 2021 KSII Transactions on Internet and Information Syst Vol.15 No.11

        Cognitive radio (CR) is a feasible intelligent technology and can be used as an effective solution to spectrum scarcity and underutilization. As the key function of CR, cooperative spectrum sensing (CSS) is able to effectively prevent the harmful interference with primary users (PUs) and identify the available spectrum resources by exploiting the spatial diversity of multiple secondary users (SUs). However, the open nature of the cognitive radio networks (CRNs) framework makes CSS face many security threats, such as, the malicious user (MU) launches Byzantine attack to undermine CRNs. For this aim, we make an in-depth analysis of the motive and purpose from the MU’s perspective in the interweave CR system, aiming to provide the future guideline for defense strategies. First, we formulate a dynamic Byzantine attack model by analyzing Byzantine behaviors in the process of CSS. On the basis of this, we further make an investigation on the condition of making the fusion center (FC) blind when the fusion rule is unknown for the MU. Moreover, the throughput and interference to the primary network are taken into consideration to evaluate the impact of Byzantine attack on the interweave CR system, and then analyze the optimal strategy of Byzantine attack when the fusion rule is known. Finally, theoretical proofs and simulation results verify the correctness and effectiveness of analyses about the impact of Byzantine attack strategy on the throughput and interference.

      • SCOPUSKCI등재

        HESnW: History Encounters-Based Spray-and-Wait Routing Protocol for Delay Tolerant Networks

        Gan, Shunyi,Zhou, Jipeng,Wei, Kaimin Korea Information Processing Society 2017 Journal of information processing systems Vol.13 No.3

        Mobile nodes can't always connect each other in DTNs (delay tolerant networks). Many DTN routing protocols that favor the "multi-hop forwarding" are proposed to solve these network problems. But they also lead to intolerant delivery cost so that designing a overhead-efficient routing protocol which is able to perform well in delivery ratio with lower delivery cost at the same time is valuable. Therefore, we utilize the small-world property and propose a new delivery metric called multi-probability to design our relay node selection principles that nodes with lower delivery predictability can also be selected to be the relay nodes if one of their history nodes has higher delivery predictability. So, we can find more potential relay nodes to reduce the forwarding overhead of successfully delivered messages through our proposed algorithm called HESnW. We also apply our new messages copies allocation scheme to optimize the routing performance. Comparing to existing routing algorithms, simulation results show that HESnW can reduce the delivery cost while it can also obtain a rather high delivery ratio.

      • KCI등재

        HESnW: History Encounters-Based Spray-and-Wait Routing Protocol for Delay Tolerant Networks

        ( Shunyi Gan ),( Jipeng Zhou ),( Kaimin Wei ) 한국정보처리학회 2017 Journal of information processing systems Vol.13 No.3

        Mobile nodes can`t always connect each other in DTNs (delay tolerant networks). Many DTN routing protocols that favor the “multi-hop forwarding” are proposed to solve these network problems. But they also lead to intolerant delivery cost so that designing a overhead-efficient routing protocol which is able to perform well in delivery ratio with lower delivery cost at the same time is valuable. Therefore, we utilize the small-world property and propose a new delivery metric called multi-probability to design our relay node selection principles that nodes with lower delivery predictability can also be selected to be the relay nodes if one of their history nodes has higher delivery predictability. So, we can find more potential relay nodes to reduce the forwarding overhead of successfully delivered messages through our proposed algorithm called HESnW. We also apply our new messages copies allocation scheme to optimize the routing performance. Comparing to existing routing algorithms, simulation results show that HESnW can reduce the delivery cost while it can also obtain a rather high delivery ratio.

      • KCI등재

        Secure and Efficient Cooperative Spectrum Sensing Against Byzantine Attack for Interweave Cognitive Radio System

        Jun Wu,Ze Chen,Jianrong Bao,Jipeng Gan,Zehao Chen,Jia Zhang 한국인터넷정보학회 2022 KSII Transactions on Internet and Information Syst Vol.16 No.11

        Due to increasing spectrum demand for new wireless devices applications, cooperative spectrum sensing (CSS) paradigm is the most promising solution to alleviate the spectrum shortage problem. However, in the interweave cognitive radio (CR) system, the inherent nature of CSS opens a hole to Byzantine attack, thereby resulting in a significant drop of the CSS security and efficiency. In view of this, a weighted differential sequential single symbol (WD3S) algorithm based on MATLAB platform is developed to accurately identify malicious users (MUs) and benefit useful sensing information from their malicious reports in this paper. In order to achieve this, a dynamic Byzantine attack model is proposed to describe malicious behaviors for MUs in an interweave CR system. On the basis of this, a method of data transmission consistency verification is formulated to evaluate the global decision’s correctness and update the trust value (TrV) of secondary users (SUs), thereby accurately identifying MUs. Then, we innovatively reuse malicious sensing information from MUs by the weight allocation scheme. In addition, considering a high spectrum usage of primary network, a sequential and differential reporting way based on a single symbol is also proposed in the process of the sensing information submission. Finally, under various Byzantine attack types, we provide in-depth simulations to demonstrate the efficiency and security of the proposed WD3S.

      • KCI등재

        Spectrum- and Energy- Efficiency Analysis Under Sensing Delay Constraint for Cognitive Unmanned Aerial Vehicle Networks

        Jia Zhang,Jun Wu,Zehao Chen,Ze Chen,Jipeng Gan,Jiangtao He,Bangyu Wang 한국인터넷정보학회 2022 KSII Transactions on Internet and Information Syst Vol.16 No.4

        In order to meet the rapid development of the unmanned aerial vehicle (UAV) communication needs, cooperative spectrum sensing (CSS) helps to identify unused spectrum for the primary users (PU). However, multi-UAV mode (MUM) requires the large communication resource in a cognitive UAV network, resulting in a severe decline of spectrum efficiency (SE) and energy efficiency (EE) and increase of energy consumption (EC). On this account, we extend the traditional 2D spectrum space to 3D spectrum space for the UAV network scenario and enable UAVs to proceed with spectrum sensing behaviors in this paper, and propose a novel multi-slot mode (MSM), in which the sensing slot is divided into multiple mini-slots within a UAV. Then, the CSS process is developed into a composite hypothesis testing problem. Furthermore, to improve SE and EE and reduce EC, we use the sequential detection to make a global decision about the PU channel status. Based on this, we also consider a truncation scenario of the sequential detection under the sensing delay constraint, and further derive a closed-form performance expression, in terms of the CSS performance and cooperative efficiency. At last, the simulation results verify that the performance and cooperative efficiency of MSM outperforms that of the traditional MUM in a low EC.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼