基于市场理论的认知无线网络动态信任阈值

Qingqi Pei, Conglin Wang, Zi Li
{"title":"基于市场理论的认知无线网络动态信任阈值","authors":"Qingqi Pei, Conglin Wang, Zi Li","doi":"10.1109/INCoS.2013.99","DOIUrl":null,"url":null,"abstract":"In Cognitive radio networks (CRNs) the primary users(PUs) and secondary users(SUs) share the spectrum resource, which can be an effective solution to the problem that the existing network spectrum utilization is not high. Therefore, to correctly sense whether the spectrum is idle or not is an important prerequisite for spectrum sharing. Spectrum sensing requires the secondary users to cooperate in sensing and report the sensed data. Therefore the CRN is subject to sensed data tampering and primary user emulation. The trustiness of the SUs is, therefore, very important. In this paper, the trust management is introduced to solve the problem of the trustiness of the SUs. A method of trust threshold value judgment is proposed for selecting the trust threshold in trust management. And the threshold will be a standard of the trustiness of SUs. Market equilibrium in the market theory is adopted. The demand function and supply function are built to find the trust value at the market equilibrium point. With the Beta distribution, the ultimate threshold will be given so that it can ensure the fairness of the SUs.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"143 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Dynamic Trust Threshold Value Based on Market Theory in Cognitive Radio Networks\",\"authors\":\"Qingqi Pei, Conglin Wang, Zi Li\",\"doi\":\"10.1109/INCoS.2013.99\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In Cognitive radio networks (CRNs) the primary users(PUs) and secondary users(SUs) share the spectrum resource, which can be an effective solution to the problem that the existing network spectrum utilization is not high. Therefore, to correctly sense whether the spectrum is idle or not is an important prerequisite for spectrum sharing. Spectrum sensing requires the secondary users to cooperate in sensing and report the sensed data. Therefore the CRN is subject to sensed data tampering and primary user emulation. The trustiness of the SUs is, therefore, very important. In this paper, the trust management is introduced to solve the problem of the trustiness of the SUs. A method of trust threshold value judgment is proposed for selecting the trust threshold in trust management. And the threshold will be a standard of the trustiness of SUs. Market equilibrium in the market theory is adopted. The demand function and supply function are built to find the trust value at the market equilibrium point. With the Beta distribution, the ultimate threshold will be given so that it can ensure the fairness of the SUs.\",\"PeriodicalId\":353706,\"journal\":{\"name\":\"2013 5th International Conference on Intelligent Networking and Collaborative Systems\",\"volume\":\"143 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-09-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 5th International Conference on Intelligent Networking and Collaborative Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/INCoS.2013.99\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INCoS.2013.99","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

在认知无线网络(crn)中,主用户(pu)和从用户(su)共享频谱资源,可以有效解决现有网络频谱利用率不高的问题。因此,正确感知频谱是否空闲是实现频谱共享的重要前提。频谱感知需要辅助用户协同感知并上报感知数据。因此,CRN容易受到感知数据篡改和主用户仿真的影响。因此,美国的信任非常重要。本文引入信任管理来解决SUs的可信任性问题。针对信任管理中信任阈值的选择问题,提出了一种信任阈值判断方法。这个门槛将成为衡量美国政府可信度的标准。采用市场理论中的市场均衡。建立了需求函数和供给函数,求出了市场平衡点上的信任值。对于Beta分布,将给出最终阈值,以确保SUs的公平性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Dynamic Trust Threshold Value Based on Market Theory in Cognitive Radio Networks
In Cognitive radio networks (CRNs) the primary users(PUs) and secondary users(SUs) share the spectrum resource, which can be an effective solution to the problem that the existing network spectrum utilization is not high. Therefore, to correctly sense whether the spectrum is idle or not is an important prerequisite for spectrum sharing. Spectrum sensing requires the secondary users to cooperate in sensing and report the sensed data. Therefore the CRN is subject to sensed data tampering and primary user emulation. The trustiness of the SUs is, therefore, very important. In this paper, the trust management is introduced to solve the problem of the trustiness of the SUs. A method of trust threshold value judgment is proposed for selecting the trust threshold in trust management. And the threshold will be a standard of the trustiness of SUs. Market equilibrium in the market theory is adopted. The demand function and supply function are built to find the trust value at the market equilibrium point. With the Beta distribution, the ultimate threshold will be given so that it can ensure the fairness of the SUs.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Improved Efficient Priority-and-Activity-Based QoS MAC Protocol Impact of Channel Estimation Error on Time Division Broadcast Protocol in Bidirectional Relaying Systems RLWE-Based Homomorphic Encryption and Private Information Retrieval A Spatially Varying Mean and Variance Active Contour Model A Secure Cloud Storage System from Threshold Encryption
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1