Transient Signal Feature Extraction Based on Box Dimension and the Largest Lyapunov Dimension

Article Preview

Abstract:

Cognitive radio is one kind of wireless communication technology, which is to effectively improve the spectrum efficiency by the way of wireless spectrum sensing. Besides of varieties of security issues of the traditional wireless communication, it also has some new problems, such as Primary User Emulation (PUE) attack. This essay presents that based on the fractal dimension of the transient signal characteristics extraction to protect the PUE attack from the cognitive wireless networks, and then extract the fractal dimension of wireless transmitter through experiments to provide reliable characteristic parameters for the next signal recognition, finally to prevent PUEs attack.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 756-759)

Pages:

3607-3610

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Hong RONG. A Detection Method of Primary User Emulation Attacks in Cognitive Radio. Industry Observe, col. 6, pp.54-58, (2012).

Google Scholar

[2] HAYKIN S. Cognitive Radio: Brain-Empowered Wireless Communications[J]. IEEE J. Sel. Areas Commun, 2005, 23(2): 201-220.

DOI: 10.1109/jsac.2004.839380

Google Scholar

[3] Mitola J, Maquire G J. Cognitive radios: making software radios more personal[J]. IEEE Personal Communications, 1999, 6(4): 13-18.

DOI: 10.1109/98.788210

Google Scholar

[4] Sangiorgi D, Walker D. The π-calculus: a Theory of Mobile Processe[M]. Cambridge University Press, (2001).

Google Scholar

[5] Wolf A , Swift J B , Swinney H L , et al. Determining Lyapunov exponents from a time series [J ] . Physica , 1985 , 16D : 185.

DOI: 10.1016/0167-2789(85)90011-9

Google Scholar

[6] Kim H S, Eykholt R, Salas J D. Nonlinear dynamics, delay times, and embedding windows[J]. Physica D, 1999, 127: 48-60.

DOI: 10.1016/s0167-2789(98)00240-1

Google Scholar