CN101753229B - Cooperative cognitive approach, apparatus and system based on wireless mobile network - Google Patents

Cooperative cognitive approach, apparatus and system based on wireless mobile network Download PDF

Info

Publication number
CN101753229B
CN101753229B CN2008102396775A CN200810239677A CN101753229B CN 101753229 B CN101753229 B CN 101753229B CN 2008102396775 A CN2008102396775 A CN 2008102396775A CN 200810239677 A CN200810239677 A CN 200810239677A CN 101753229 B CN101753229 B CN 101753229B
Authority
CN
China
Prior art keywords
unauthorized
unauthorized user
grouping
group
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN2008102396775A
Other languages
Chinese (zh)
Other versions
CN101753229A (en
Inventor
程世伦
杨震
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Group Shandong Co Ltd
Original Assignee
China Mobile Group Shandong Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Group Shandong Co Ltd filed Critical China Mobile Group Shandong Co Ltd
Priority to CN2008102396775A priority Critical patent/CN101753229B/en
Publication of CN101753229A publication Critical patent/CN101753229A/en
Application granted granted Critical
Publication of CN101753229B publication Critical patent/CN101753229B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a cooperative cognitive approach based on wireless mobile network, comprising the following steps: an unauthorized system dividing each two unauthorized clients existing in the system into one group, and determining the data reliability of respective unauthorized client in each group contained in the dividing result, and acquiring the environmental information of each group acquired on the basis of the cooperative cognition according to the data reliability, and combining the information to acquire the final environment sensory result; and the data reliability in inverse proportion to the distance between the unauthorized client and the authorized base station is used for regulating the value of environment information acquired by the unauthorized client. Thus, the reliability of the environment information acquired on the basis of cooperative cognition is improved after that each two unauthorized clients are combined; on the basis, the environment information acquired by the respective combination are combined to acquire the final environment sensory result, and the accuracy of environment sensory result is further improved. The invention also discloses a communication apparatus and a communication system.

Description

Cooperative cognition method, device and system based on wireless mobile network
Technical Field
The invention relates to the field of communication, in particular to a cooperative cognitive method, a cooperative cognitive device and a cooperative cognitive system based on a wireless mobile network.
Background
With the development of wireless mobile services, wireless spectrum has become an indispensable precious resource in modern society, and research shows that the spectrum utilization rate of authorized users is only 15% -85% by using the existing spectrum authorization mechanism. In order to effectively improve the utilization rate of the spectrum resources, a cognitive radio (cognitive radio) technology is adopted in the prior art to realize secondary utilization of the spectrum resources, that is, when authorized users do not occupy authorized spectrum resources, unauthorized users use the spectrum resources, so that the authorized users and the unauthorized users share the spectrum resources. For example, in a cognitive radio technology-based WRAN network, TV spectrum resources are licensed spectrum, and different unlicensed users may use the cognitive radio technology to share the TV spectrum resources fairly without interfering TV broadcast signals.
When the cognitive radio technology is used, the base station to which the unauthorized user belongs usually makes corresponding evaluation on the current network state, the unauthorized user and the scene information of the surrounding environment according to the sensing capability of the unauthorized user to the environment, and configures corresponding spectrum resources for the unauthorized user according to the evaluation result, so that the spectrum resources are utilized most fully.
The traditional cognitive radio technology adopts a single-node environment cognitive mode, namely, the use condition of frequency spectrum resources is evaluated according to environment information perceived by a single unauthorized user. However, in a complex and variable cognitive radio environment, the environment sensing capability of a single unauthorized user is limited, for example, the energy sensing robustness is poor, the sensing time required for cyclostationary detection is long, and the data reliability of the obtained environment information is poor.
Aiming at the defects existing in the traditional mode, a technical concept of cooperative cognition is provided, namely, the use condition of spectrum resources is evaluated according to environment information sensed by a plurality of unauthorized users, the requirement on the sensing capability of a single authorized user is reduced through cooperation among the unauthorized users, and the sensing accuracy and the data reliability of the obtained environment information are improved.
At present, there are a plurality of cooperative cognitive technologies, and the most representative three technologies are:
1、Ganesan G.,Ye Li.″Cooperative spectrum sensing in cognitive radio-partI-II:two user(multiuser)networks.″IEEE Transactions on WirelessCommunications,2007,6(6):2204-2222。
2、Chunhua Sun,Wei Zhang,et al.″Cooperative spectrum sensing forcognitive radios under bandwidth constraints.″IEEE Wireless Communications andNetworking Conference,2007(WCNC 2007),Hong Kong,2007,1-5。
3、Ghasemi,A.and E.S.Sousa.″Optimization of spectrum sensing foropportunistic spectrum access in cognitive radio networks.″IEEE ConsumerCommunications and Networking Conference,CCNC 2007,2007,1022-1026。
hereinafter, the above three techniques will be referred to as Ganesan technique, Sun technique, and ghasemii technique, respectively.
The precondition of using the Ganesan technology is that the unauthorized user is assumed to be in a static state, and therefore, the Ganesan technology is not applicable in an application scenario where the unauthorized user is a wireless mobile user.
The Sun technology is adopted on the premise that the environment information perceived and obtained by the unauthorized user is reliable enough, and in the application scene that the unauthorized user is a wireless mobile user, the position of the unauthorized user is dynamically changed, and the distance between the unauthorized user and the authorized base station is changed, so that the reliability of the environment information perceived and obtained by the unauthorized user is dynamically different, and obviously, the Sun technology is not suitable for the situation.
When the ghasemii technology is adopted, there are two cases, the first is: based on the AND rule, determining that the licensed spectrum resources have been occupied by the licensed user if AND only if all of the unlicensed users detect data of the licensed user; the use of this method can seriously affect the normal communications of authorized users. The second method is as follows: based on the OR rule, when any unauthorized user detects data of an authorized user, it is determined that the authorized spectrum resource is occupied by the authorized user, and the use of the method still limits the improvement of the spectrum utilization rate.
In summary, the existing cooperative cognitive methods cannot meet the requirements of the wireless mobile network, and therefore, a new cooperative cognitive method needs to be provided to improve the accuracy of the environmental information perceived by the unauthorized user.
Disclosure of Invention
The embodiment of the invention provides a cooperative cognitive method, a cooperative cognitive device and a cooperative cognitive system based on a wireless mobile network, which are used for improving the accuracy of an obtained environment perception result when an unauthorized user perceives a network environment.
The embodiment of the invention provides the following specific technical scheme:
a cooperative cognitive method based on a wireless mobile network comprises the following steps:
grouping every two unauthorized users in the system to obtain a grouping result;
determining the data reliability of each unauthorized user in each group contained in the grouping result, wherein the data reliability is in inverse proportion to the distance between the unauthorized user and the authorized base station and is used for adjusting the value of the environmental information acquired by the unauthorized user; wherein, when calculating the data credibility, if N unauthorized users exist in the system and N is>0, and a group comprising an unauthorized user i and an unauthorized user j, i ∈ [1, N [ ]],j∈[1,N]Then by the formula
Figure GDA00001804879900031
And
Figure GDA00001804879900032
to respectively calculate the data credibility of the unauthorized user i and the unauthorized user j
Figure GDA00001804879900033
And
Figure GDA00001804879900034
wherein, OiAnd OjSignal transmission power of authorized base station, d, sensed by unauthorized user i and unauthorized user j, respectivelyiAnd djDistances between an unauthorized user i and an unauthorized user j and an authorized base station respectively, and alpha is a preset path loss exponent Zetai=λi2,ζj=λj2,λiAnd λjRespectively setting signal transmission power threshold values of a preset unauthorized user i and a preset unauthorized user j, wherein beta is a preset constant;
acquiring environmental information of each group obtained based on cooperative cognition according to the data credibility of each unauthorized user in each group;
and combining the environmental information obtained by each group based on the cooperative cognition to obtain a final environmental perception result.
A communications device for policing unauthorized users, comprising:
the first processing unit is used for grouping every two unauthorized users existing in the system to obtain a grouping result, determining the data reliability of each unauthorized user in each group contained in the grouping result, wherein the data reliability is in inverse proportion to the distance between the unauthorized user and the authorized base station and is used for adjusting the value of the environmental information acquired by the unauthorized user; wherein, when calculating the data credibility, if N unauthorized users exist in the system and N is>0, and a group comprising an unauthorized user i and an unauthorized user j, i ∈ [1, N [ ]],j∈[1,N]Then by the formulaAnd
Figure GDA00001804879900042
to respectively calculate the data credibility of the unauthorized user i and the unauthorized user j
Figure GDA00001804879900043
And
Figure GDA00001804879900044
wherein, OiAnd OjSignal transmission power of authorized base station, d, sensed by unauthorized user i and unauthorized user j, respectivelyiAnd djDistances between an unauthorized user i and an unauthorized user j and an authorized base station respectively, and alpha is a preset path loss exponent Zetai=λi2,ζj=λj2,λiAnd λjRespectively setting signal transmission power threshold values of a preset unauthorized user i and a preset unauthorized user j, wherein beta is a preset constant;
the second processing unit is used for acquiring environmental information of each group acquired based on cooperative cognition according to the data credibility of each unauthorized user in each group;
and the merging unit is used for merging the environment information acquired based on the cooperative cognition of each group to obtain a final environment perception result.
A communication system, comprising:
the unauthorized user is used for sensing the network environment based on cooperative cognition and sending the acquired environment information to the unauthorized base station;
the unauthorized base station is used for grouping unauthorized users existing in the system in pairs to obtain a grouping result, determining the data reliability of each unauthorized user in each group contained in the grouping result, obtaining the environmental information of each group obtained based on cooperative cognition according to the data reliability of each unauthorized user in each group, and combining the environmental information to obtain a final environmental perception result; the data reliability is inversely proportional to the distance between the unauthorized user and the authorized base station, and is used for adjusting the value of the environmental information acquired by the unauthorized user; wherein, when calculating the data credibility, if N unauthorized users exist in the system and N is>0, and a group comprising an unauthorized user i and an unauthorized user j, i ∈ [1, N [ ]],j∈[1,N]Then by the formula
Figure GDA00001804879900051
And
Figure GDA00001804879900052
to respectively calculate the data credibility of the unauthorized user i and the unauthorized user j
Figure GDA00001804879900053
Andwherein, OiAnd OjSignal transmission power of authorized base station, d, sensed by unauthorized user i and unauthorized user j, respectivelyiAnd djDistances between an unauthorized user i and an unauthorized user j and an authorized base station respectively, and alpha is a preset path loss exponent Zetai=λi2,ζj=λj2,λiAnd λjThe threshold values of the signal transmission power of the preset unauthorized user i and the threshold value of the signal transmission power of the unauthorized user j are respectively, and beta is a preset constant.
In the embodiment of the invention, the unauthorized base station groups every two unauthorized users in the system to obtain a grouping result; determining the data credibility of each unauthorized user in each group contained in the grouping result, obtaining the environmental information of each group obtained based on the cooperative cognition according to the data credibility of each unauthorized user in each group, and combining the environmental information to obtain a final environmental perception result; the data reliability is inversely proportional to the distance between the unauthorized user and the authorized base station, and is used for adjusting the value of the environmental information acquired by the unauthorized user. Therefore, the influence of the mobility of the unauthorized user on the acquired environment information is fully considered, the reliability of the environment information acquired by the unauthorized user based on cooperative cognition after pairwise combination is improved, on the basis, the environment information acquired by each combination is combined to obtain a final environment sensing result, the accuracy of the environment sensing result is further improved, the unauthorized user is effectively prevented from interfering the authorized user, the unauthorized base station can accurately evaluate the use condition of authorized spectrum resources, and the spectrum utilization rate is further improved effectively.
Drawings
FIG. 1 is a diagram of a communication system architecture in an embodiment of the present invention;
FIG. 2 is a diagram of a SU base station functional structure in an embodiment of the present invention;
fig. 3 is a flowchart of sensing, by an SU base station, a current network environment through an SU user in the embodiment of the present invention;
fig. 4-6 are schematic diagrams illustrating comparison of performance of the AND rule-based method AND the NBS cooperative cognition method.
Detailed Description
When the network environment is sensed by an unauthorized user, the accuracy of the obtained environment sensing result is improved. In the embodiment of the invention, every two unauthorized users existing in the system are grouped to obtain a grouping result, the data reliability of each unauthorized user in each group contained in the grouping result is determined, the data reliability is inversely proportional to the distance between the unauthorized user and an authorized base station and is used for adjusting the value of the environmental information acquired by the unauthorized user, and then the environmental information acquired by each group through cooperative cognition is obtained according to the data reliability of each unauthorized user in each group and is combined to obtain the final environmental perception result.
In the embodiment of the present invention, when two unauthorized users (hereinafter referred to as SU users) in each group perform cooperative cognition, a cooperative cognition manner is determined based on Nash Bargaining solution (Nash Bargaining solution), that is, respective data reliability is calculated based on Nash Bargaining solution.
For example, assume that there are N SU users and N in the system>0, thenAny two SU users are called SU i and SUj, i ∈ [1, N)],j∈[1,N]. Based on the Nash bargaining of two users, the cooperative cognitive approach between SU i and SU j can be expressed as
Figure GDA00001804879900061
Wherein,
Figure GDA00001804879900062
anddata credibility, O, of SU i and SU j, respectivelyiAnd OjSignal transmission power of authorized base stations (hereinafter referred to as PU base stations) perceived for SU i and SU j, respectively, diAnd djDistances between SU i and SUj and the PU base station, λ, respectivelyiAnd λjThe threshold values of the signal transmission power of SU i and SUj are preset respectively, α is a preset path loss exponent, and β is a preset constant. Are respectively paired
Figure GDA00001804879900064
And
Figure GDA00001804879900065
derived by derivation
Figure GDA00001804879900066
Let lambdai2=ζi,λj2=ζjThen get
Figure GDA00001804879900071
When the temperature of the water is higher than the set temperature,
Figure GDA00001804879900072
is shown asTo get
Figure GDA00001804879900074
When the temperature of the water is higher than the set temperature,
Figure GDA00001804879900075
is shown as
Figure GDA00001804879900076
On the other hand, let λi=λjWhen the data reliability of the SU user is 0, the data reliability of the SU user can be seen
Figure GDA00001804879900077
Inversely proportional to the distance d between the SU user and the PU base station. As the distance between the SU user and the PU base station increases, the less the SU user perceives the signal transmission power of the PU base station, and the less trustworthy the environment information it obtains.
In practical applications, the above scheme can be applied to various Wireless mobile networks, such as Wireless Local Area Network (WRAN), Wireless Local Area Network (WLAN), Wireless Personal Area Network (WPAN), Beyond three-generation mobile communication Network (Beyond 3G, B3G), Sensor Network (Sensor Network), and Worldwide Interoperability for Microwave Access (WIMAX), etc.
The preferred embodiments of the present invention will be described in detail below with reference to the accompanying drawings, which illustrate a WAN network.
Referring to fig. 1, in the embodiment of the present invention, the WRAN network includes an SU base station, an SU user, and a PU base station, wherein,
the PU base station is used for managing authorized spectrum resources;
the SU user is used for sensing the network environment and sending the acquired environment information to the unauthorized base station;
the SU base station is used for grouping SU users existing in the system in pairs to obtain a grouping result, determining the data reliability of each SU user in each group contained in the grouping result, obtaining the environmental information obtained by each group based on the cooperative cognition according to the data reliability of each SU user in each group, and combining the environmental information to obtain a final environmental perception result; and the data reliability is inversely proportional to the distance between the SU user and the PU base station, and is used for adjusting the value of the environmental information acquired by the SU user.
Referring to fig. 2, in the present embodiment, the SU base station includes a first processing unit 10, a second processing unit 11 and a combining unit 12, wherein,
the first processing unit 10 is configured to group each two SU users existing in the system to obtain a grouping result, and determine data reliability of each SU user in each group included in the grouping result, where the data reliability is inversely proportional to a distance between the SU user and the PU base station, and is configured to adjust a value of environmental information acquired by the SU user;
the second processing unit 11 is configured to obtain, according to the data reliability of each SU user in each group, environment information obtained based on the cooperative cognition in each group;
and the merging unit is used for merging the environment information acquired based on the cooperative cognition of each group to obtain a final environment perception result.
Based on the system architecture, referring to fig. 3, in this embodiment, a detailed process of sensing the current network environment by the SU base station through cooperative cognition between SU users is as follows:
step 300: and determining SU users existing in the system, and performing any pairwise grouping on the SU users.
In this embodiment, assuming that N SU users exist in the system and N >0, when N is an even number, the SU users are directly grouped in pairs, and two SU users in each group establish a cooperative cognitive relationship; and when N is an odd number, supplementing the (N + 1) th SU user, wherein the perception data obtained by the (N + 1) th SU user is set to be zero, and the cooperative cognitive relationship is not established with other SU users.
Step 310: obtaining data credibility of each SU user in each group
Suppose that any two SU users are called SU i and SU j, i ∈ [1, N)],j∈[1,N]Then when a group contains SU i and SUj, the data confidence of SU i is expressed as
Figure GDA00001804879900082
And SUj as data confidence
Figure GDA00001804879900083
OiSignal transmission power of PU base station perceived by SU i, OjSignal transmission power of PU base station perceived by SU j, diIs the distance between SU i and PU base station, djThe four parameters are the distance between SU j and PU base station, and alpha is the preset path loss index, zetai=λi2,ζj=λj2Wherein λ isiIs a preset signal transmission power threshold value of SU i, lambdaiIs a preset signal transmission power threshold value of SU j, and beta is a preset constant. Wherein:
data confidence for SU i and SU j
Figure GDA00001804879900091
And
Figure GDA00001804879900092
the value of (b) is mainly determined by the signal transmission power O of the PU base station sensed by SU i and SU jiAnd OjAnd the distance d between the PU base station and the PU base stationiAnd dj. Take a special scenario where the environmental noise is negligible as an example, at this time ζi=ζjWhen the expression is 0, it can be seen that,
Figure GDA00001804879900093
and
Figure GDA00001804879900094
are respectively connected with
Figure GDA00001804879900095
And
Figure GDA00001804879900096
inversely proportional, then assume α is 2, di=10Km,dj=15Km,Oi=10Mw,OjIf =10Mw, then
Figure GDA00001804879900097
Figure GDA00001804879900098
Obviously, the data reliability of SU i is far higher than that of SUj, so in the subsequent process, the SU base station follows
Figure GDA00001804879900099
And
Figure GDA000018048799000910
the value of the environmental information acquired by the SU i and the SU SUj through cooperative cognition is adjusted, so that the value of the environmental information can be dynamically changed according to the distance between the SU user and the PU base station, the mobility of the SU user is fully considered, and the accuracy of the acquired environmental information is improved to a great extent. Step 320: according to the data credibility of each SU user in each groupAnd calculating the corresponding collaborative profit value of each group.
In this embodiment, preferably, hungary (HUNGARIAN METHOD, HM) algorithm is adopted to calculate the collaborative profit value Ω corresponding to each SUi and SUj combinationijThe specific matrix is as follows:
Figure GDA000018048799000912
wherein:
Ωij=-Φij+max(Φij),
Figure GDA000018048799000913
wherein,
Figure GDA00001804879900101
and
Figure GDA00001804879900102
initial data confidence for SU i and SUj respectively,andrespectively, the confidence of the data changed by SUi and SU j during the collaboration process.
Step 330: and determining final pairwise grouping results for all SU users according to the corresponding collaborative profit values of each group, wherein two SU users belonging to the same group establish a collaborative cognitive relationship between each other.
In this embodiment, since the HM algorithm is adopted, according to the characteristics of the algorithm, the condition that every two grouping results are finally determined to be in accordance with is as follows: each set of corresponding Ω includedijAre all 0. For example, there are four SU users, referred to as SU1, SU2, SU3, and SU4, respectively, where Ω12=0,Ω341 is ═ 1; and omega13=0,Ω24If 0, the final pairwise grouping result is: SU1 and SU3, and SU2 and SU 4.
On the other hand, if the cooperation profit value is calculated by using an algorithm other than the HM algorithm, Ω may not be usedijAll the conditions are 0 to determine the grouping result, and the corresponding conditions are set according to the actual situation and will beEach group of corresponding collaboration benefit values is compared with the corresponding collaboration benefit values, and then a grouping result is determined according to the comparison result, which is not described herein again.
Step 340: determining the data credibility of each SU user in each group contained in the final pairwise grouping result
Figure GDA00001804879900105
Calculating the false alarm probability and the detection probability obtained when two SU users in each group perform cooperative cognition according to the calculated false alarm probability and detection probability; the False Alarm Probability (False Alarm Probability) and the detection Probability (detective Probability) are environmental information obtained by two SU users through cooperative cognition.
In this embodiment, in a WRAN environment, in order to protect normal communication of the PU base station, the false alarm probability should be generally lower than 10%, and the sounding probability should be generally higher than 90%.
Still taking SU i and SU j as an example, when both perform cooperative learning,
the obtained false alarm probability is:
Figure GDA00001804879900106
and the obtained detection probability:
Figure GDA00001804879900111
Figure GDA00001804879900112
wherein, the sigma is the variance of the noise,
Figure GDA00001804879900113
and
Figure GDA00001804879900114
the average signal-to-interference ratios of SU i and SU j are respectively, l is a preset constant, and N/2 is a unit sample value.
Step 350: and combining the false alarm probability and the detection probability obtained by cooperative cognition of each group, and taking the false alarm probability and the detection probability as a final environment perception result.
In this embodiment, the false alarm probability AND the detection probability obtained by cooperative cognition in each group are combined by using an "AND" rule, AND the finally obtained environment sensing result includes the following contents:
merged false alarm probability PfExpressed as:
combined probability of detection PdExpressed as:
Figure GDA00001804879900116
by the embodiment, after the final environment sensing result is obtained, the use condition of the authorized spectrum resource in the system can be accurately evaluated according to the environment sensing result. For example, assume λi=λj=3,N =8, the distance between SU i and PU base station is 30Km, when the distance between SU j and PU base station is 10-50Km, the detection probability obtained by SU i and SU j through cooperative cognition is larger than 90%, and the result can be used as the basis for judging whether the authorized spectrum resource is occupied by PU user.
Obviously, in the embodiment of the invention, the SU users perform cooperative cognition on the network environment through pairwise combination, and the SU base station adjusts the value of the environmental information perceived by the SU users through the data credibility of the SU users in each combination, so that the influence of the mobility of the SU users on the perception result is fully considered, and the accuracy of the perceived environmental information is improved to a great extent.
The significant technical effects of the present invention will be described below with specific data by comparing the method of the present invention (referred to as NBS cooperative learning method) with the conventional AND rule-based method using matlab7.01 simulation tool.
It is assumed that both methods are carried out on the premise that: parameter(s)
Figure GDA00001804879900121
If the noise variance σ is 1, l is 2, the path loss exponent α is 3.5, and the sample value N is 4,8, then the comparison result is as follows:
referring to fig. 4, when the AND rule-based method is used, the data failure rate p obtained after the SU user perceives the network environmentm(pm=1-pd) The method is not influenced by the distance between the SU user and the PU base station; and when the NBS cooperative cognition method is used, the obtained data failure rate pmBut the change of the distance between the SU user and the PU base station is reflected, and the function of data reliability is displayed.
Referring to fig. 5, the false alarm probability p is obtained by using the AND rule-based method AND the NBS cooperative cognition method, respectivelyfAnd data failure rate pmThe performance of the results obtained are then compared, as shown in fig. 5, at a false alarm probability pfUnder the same condition, the data failure rate p obtained by adopting the NBS cooperative cognition methodmThe obvious reduction; vice versa, i.e. at data failure rate pmUnder the same condition, the false alarm probability p obtained by adopting the NBS cooperative cognition methodfAnd also significantly reduced. For example, when PfWhen the sum is 0.1, the data failure rate p obtained by using the NBS cooperative learning method is higher than that obtained by using the AND rule-based methodmThe reduction is about 10%.
Referring to fig. 6, for different numbers of SU users, the detection probability p is obtained by using the AND rule-based method AND the NBS cooperative cognition method respectivelydAs shown in FIG. 6As shown, taking 6 SU users as an example, the detection probability p obtained by using the NBS cooperative cognition method is compared with the AND rule-based methoddThe improvement is 19 percent.
As can be seen from the three simulation examples, the NBS cooperative cognition method performs cooperative cognition on a network environment by using two SU users as a combination, AND then fuses the obtained perception data of each group to obtain a final environment perception result on the basis of improving the reliability of the perception data, so that the accuracy of the environment perception result obtained by using the NBS cooperative cognition method is greatly improved compared with an AND rule-based method.
Based on the above embodiment, in another case, the pairwise grouping between the SU users may also be preset by the administrator, and in this case, the SU base station may directly obtain the preset pairwise grouping result, and calculate the data reliability of each SU user in each group through the formula recorded in step 310
Figure GDA00001804879900131
And then the data credibility of each SU user is obtained through step 340
Figure GDA00001804879900132
Calculating the false alarm probability and the detection probability obtained when two SU users in each group perform cooperative cognition, then combining the false alarm probability and the detection probability obtained by cooperative cognition in each group in step 350 to obtain a final environment perception result, and accurately evaluating the authorized spectrum resources in the system according to the environment perception result. The same technical effects as those of steps 300 to 350 can be achieved by using this method, and the details are not repeated herein.
On the other hand, in the above two embodiments, the threshold value of the signal transmission power of the kth SU user is usually preset to be λk,k∈[1,N]However, in practical applications, the actual threshold value of the signal transmission power of the kth SU user is usually in accordance withThis is because, in
Figure GDA00001804879900134
In addition, the data credibility is considered
Figure GDA00001804879900135
To be composed of
Figure GDA00001804879900136
By the distance d between the kth SU user and the PU base stationkThe signal transmitting power O of the PU base station perceived by the SU userkAnd path attenuation a, and therefore, the method adopts
Figure GDA00001804879900137
The mobility of the kth SU user is fully considered as the actual threshold value, and the mobility of the kth SU user changes along with the movement of the SU user, so that the current performance of the SU user can be fully allocated.
In summary, in the embodiment of the present invention, each two SU users existing in the system are grouped by the SU base station, and the data reliability of each SU user in each group included in the grouping result is determined, and according to the data reliability, the environment information obtained by each group based on cooperative cognition is obtained and is combined to obtain the final environment sensing result; and the data reliability is inversely proportional to the distance between the SU user and the PU base station, and is used for adjusting the value of the environmental information acquired by the SU user. Therefore, the influence of the mobility of the SU user on the environment information acquired by the SU user is fully considered, the credibility of the environment information acquired by the SU user based on cooperative cognition after two SU users are combined in pairs is improved, on the basis, the environment information acquired by each combination is combined to obtain a final environment sensing result, the accuracy of the environment sensing result is further improved, the interference of the SU user on the PU user is effectively prevented, the use condition of authorized spectrum resources can be accurately evaluated by the SU base station, and the spectrum utilization rate is effectively improved.
It will be apparent to those skilled in the art that various changes and modifications may be made in the embodiments of the present invention without departing from the spirit and scope of the invention. Thus, provided that such modifications and variations in the embodiments of the present invention fall within the scope of the claims of the present invention and their equivalents, the embodiments of the present invention are intended to include such modifications and variations as well.

Claims (13)

1. A cooperative cognitive method based on a wireless mobile network is characterized by comprising the following steps:
grouping every two unauthorized users in the system to obtain a grouping result;
determining the data reliability of each unauthorized user in each group contained in the grouping result, wherein the data reliability is in inverse proportion to the distance between the unauthorized user and the authorized base station and is used for adjusting the value of the environmental information acquired by the unauthorized user; wherein, when calculating the data credibility, if N unauthorized users exist in the system and N is>0, and a group comprising an unauthorized user i and an unauthorized user j, i ∈ [1, N [ ]],j∈[1,N]Then by the formula θ i = d j α ( o j - ζ j ) d i α o j + ζ i o i And θ j = d i α ( o i - ζ i ) d j α o i + ζ j o j to respectively calculate the data credibility theta of the unauthorized user i and the unauthorized user jiAnd thetaj(ii) a Wherein, OiAnd OjSignal transmission power of authorized base station, d, sensed by unauthorized user i and unauthorized user j, respectivelyiAnd djDistances between an unauthorized user i and an unauthorized user j and an authorized base station respectively, and alpha is a preset path loss exponent Zetaii2,ζjj2,λiAnd λjRespectively setting signal transmission power threshold values of a preset unauthorized user i and a preset unauthorized user j, wherein beta is a preset constant;
acquiring environmental information of each group obtained based on cooperative cognition according to the data credibility of each unauthorized user in each group;
and combining the environmental information obtained by each group based on the cooperative cognition to obtain a final environmental perception result.
2. The method of claim 1, wherein grouping unauthorized users present in the system pairwise comprises:
determining unauthorized users existing in the system, and performing arbitrary pairwise grouping on the unauthorized users;
calculating the data credibility of each unauthorized user in each group;
calculating a cooperative income value corresponding to each group according to the data credibility of each unauthorized user in each group;
and determining grouping results according to the corresponding collaboration profit values of each group.
3. The method of claim 1, wherein grouping unauthorized users present in the system pairwise comprises:
acquiring a preset grouping mode;
grouping the unauthorized users pairwise according to the grouping mode;
a grouping result is obtained.
4. The method according to claim 1, 2 or 3, wherein if there are N unauthorized users in the system and N >0, when N is even number, each unauthorized user is directly grouped two by two; and when N is an odd number, supplementing the (N + 1) th unauthorized user, and grouping each unauthorized user in pairs, wherein the value of the environmental information sensed by the (N + 1) th unauthorized user is set to be zero.
5. A method as claimed in claim 1, 2 or 3, characterised by using a matrix if the confidence level of the data of the unauthorised users in each group is calculated during the grouping process
Figure FDA00002035681100021
And formula Ωij=-Фij+max(Фij),
Figure FDA00002035681100022
Calculating the cooperative profit value corresponding to each group; wherein omegaijIs a collaborative revenue value, θ'iAnd θ'jInitial data credibility, theta ″, of unauthorized user i and unauthorized user j, respectivelyiAnd θ ″)jAnd respectively the data credibility of the unauthorized user i and the unauthorized user j changed in the cooperation process.
6. The method according to claim 1, 2 or 3, wherein a grouping manner including each group of the collaborative profit values corresponding to 0 is determined as a grouping result.
7. The method as claimed in claim 1, 2 or 3, wherein the unauthorized user adopts λ/θ as the actual threshold of signal transmission power, where λ is the threshold of signal transmission power preset for the unauthorized user, and θ is the data reliability of the unauthorized user.
8. A communications device for policing unauthorized users, comprising:
the first processing unit is used for grouping every two unauthorized users existing in the system to obtain a grouping result, determining the data reliability of each unauthorized user in each group contained in the grouping result, wherein the data reliability is in inverse proportion to the distance between the unauthorized user and the authorized base station and is used for adjusting the value of the environmental information acquired by the unauthorized user; wherein, when calculating the data credibility, if N unauthorized users exist in the system and N is>0, and a group comprising an unauthorized user i and an unauthorized user j, i ∈ [1, N [ ]],j∈[1,N]Then by the formula θ i = d j α ( o j - ζ j ) d i α o j + ζ i o i And θ j = d i α ( o i - ζ i ) d j α o i + ζ j o j to respectively calculate the data credibility theta of the unauthorized user i and the unauthorized user jiAnd thetaj(ii) a Wherein, OiAnd OjSignal transmission power of authorized base station, d, sensed by unauthorized user i and unauthorized user j, respectivelyiAnd djDistances between an unauthorized user i and an unauthorized user j and an authorized base station respectively, and alpha is a preset path loss exponent Zetaii2,ζjj2,λiAnd λjRespectively setting signal transmission power threshold values of a preset unauthorized user i and a preset unauthorized user j, wherein beta is a preset constant;
the second processing unit is used for acquiring environmental information of each group acquired based on cooperative cognition according to the data credibility of each unauthorized user in each group;
and the merging unit is used for merging the environment information acquired based on the cooperative cognition of each group to obtain a final environment perception result.
9. The communication apparatus according to claim 8, wherein the first processing unit determines unauthorized users existing in the system when performing pairwise grouping on unauthorized users existing in the system, performs arbitrary pairwise grouping on the unauthorized users, calculates data reliability of the unauthorized users in each group, calculates a cooperation profit value corresponding to each group according to the data reliability of the unauthorized users in each group, and determines a grouping result according to the cooperation profit value corresponding to each group.
10. The communication apparatus according to claim 8, wherein the first processing unit obtains a predetermined grouping manner when pairwise grouping is performed on unauthorized users existing in the system, performs pairwise grouping on the unauthorized users according to the grouping manner, obtains a grouping result, and after the grouping result is obtained, calculates data reliability of each unauthorized user in each group included in the grouping result by the second processing unit.
11. A communication system, comprising:
the authorized base station is used for managing authorized spectrum resources;
the unauthorized user is used for sensing the network environment and sending the acquired environment information to the unauthorized base station;
the unauthorized base station is used for grouping unauthorized users existing in the system in pairs to obtain a grouping result, determining the data reliability of each unauthorized user in each group contained in the grouping result, obtaining the environmental information of each group obtained based on cooperative cognition according to the data reliability of each unauthorized user in each group, and combining the environmental information to obtain a final environmental perception result; the data reliability is inversely proportional to the distance between the unauthorized user and the authorized base station, and is used for adjusting the value of the environmental information acquired by the unauthorized user; wherein, when calculating the data credibility, if N unauthorized users exist in the system and N is>0, and a group comprising an unauthorized user i and an unauthorized user j, i ∈ [1, N [ ]],j∈[1,N]Then by the formula θ i = d j α ( o j - ζ j ) d i α o j + ζ i o i And θ j = d i α ( o i - ζ i ) d j α o i + ζ j o j to respectively calculate the data credibility theta of the unauthorized user i and the unauthorized user jiAnd thetaj(ii) a Wherein, OiAnd OjSignal transmission power of authorized base station, d, sensed by unauthorized user i and unauthorized user j, respectivelyiAnd djDistances between an unauthorized user i and an unauthorized user j and an authorized base station respectively, and alpha is a preset path loss exponent Zetaii2,ζjj2,λiAnd λjAre respectively asThe preset signal transmission power threshold values of the unauthorized user i and the unauthorized user j are preset constant values.
12. The communication system of claim 11, wherein the unauthorized base station determines unauthorized users existing in the system when pairwise grouping the unauthorized users existing in the system, randomly performs pairwise grouping on the unauthorized users, calculates data reliability of the unauthorized users in each group, calculates a cooperative gain value corresponding to each group according to the data reliability of the unauthorized users in each group, and determines a grouping result according to the cooperative gain value corresponding to each group.
13. The communication system according to claim 11, wherein the first processing unit obtains a predetermined grouping manner when pairwise grouping is performed on unauthorized users existing in the system, performs pairwise grouping on the unauthorized users according to the grouping manner, obtains a grouping result, and calculates data reliability of each unauthorized user in each group included in the grouping result after obtaining the grouping result.
CN2008102396775A 2008-12-15 2008-12-15 Cooperative cognitive approach, apparatus and system based on wireless mobile network Active CN101753229B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2008102396775A CN101753229B (en) 2008-12-15 2008-12-15 Cooperative cognitive approach, apparatus and system based on wireless mobile network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2008102396775A CN101753229B (en) 2008-12-15 2008-12-15 Cooperative cognitive approach, apparatus and system based on wireless mobile network

Publications (2)

Publication Number Publication Date
CN101753229A CN101753229A (en) 2010-06-23
CN101753229B true CN101753229B (en) 2013-03-13

Family

ID=42479695

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2008102396775A Active CN101753229B (en) 2008-12-15 2008-12-15 Cooperative cognitive approach, apparatus and system based on wireless mobile network

Country Status (1)

Country Link
CN (1) CN101753229B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102801489B (en) * 2011-05-25 2016-03-30 中兴通讯股份有限公司 Multichannel same source data merges the method and device that receive
CN104270228B (en) * 2014-09-01 2018-02-02 西安电子科技大学 Adaptive cooperation transmission method in a kind of MIMO CCRN
CN112073974B (en) * 2020-08-14 2021-07-06 北京大学 Unauthorized spectrum edge access and anti-interference method and device for cooperative terminal communication

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101197020A (en) * 2006-12-07 2008-06-11 国际商业机器公司 Lifecycle objectification of non-activity objects in an activity thread
CN101286807A (en) * 2008-05-19 2008-10-15 华中科技大学 OFDM frequency spectrum distributing method by identifying radio network based on interference of receiver

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101197020A (en) * 2006-12-07 2008-06-11 国际商业机器公司 Lifecycle objectification of non-activity objects in an activity thread
CN101286807A (en) * 2008-05-19 2008-10-15 华中科技大学 OFDM frequency spectrum distributing method by identifying radio network based on interference of receiver

Also Published As

Publication number Publication date
CN101753229A (en) 2010-06-23

Similar Documents

Publication Publication Date Title
Quan et al. Optimal multiband joint detection for spectrum sensing in cognitive radio networks
CN106656374A (en) Cooperative broadband spectrum sensing method based on double-threshold energy detection
CN103338082B (en) Double-threshold cooperation frequency spectrum sensing method based on k-rank criteria
CN103746756B (en) Cognitive radio networks interference estimation method based on simulated main customer attack
US20200169883A1 (en) Security Detection Method for Physical Layer Authentication System
CN104469784A (en) Processing method and apparatus of frequency spectrum sensing data in heterogeneous network
CN106603500B (en) Frequency spectrum perception data detection method in cognition wireless network based on relationship match
TW201410057A (en) Active sensing method based on spectral correlation for cognitive radio systems
US20200169882A1 (en) Security Detection for a Physical Layer Authentication System that Considers Signal-Discriminating Capability of an Active Adversary
Wang et al. Opportunistic spectrum access by exploiting primary user feedbacks in underlay cognitive radio systems: An optimality analysis
CN103338085B (en) Two-layer cooperative spectrum sensing method based on double thresholds
CN101753229B (en) Cooperative cognitive approach, apparatus and system based on wireless mobile network
CN103763043A (en) Efficient radio spectrum sensing method based on collaborative cognitive network
Parmaksız et al. A review of recent developments on secure authentication using RF fingerprints techniques
CN108449151B (en) Spectrum access method in cognitive radio network based on machine learning
Li et al. Spectrum detection and link quality assessment for heterogeneous shared access networks
Zhao et al. Relay-assisted cross-channel gain estimation for spectrum sharing
Ashok et al. Performance Analysis of Energy Spotting and Cyclostationary Methods in Cognitive Radio
CN109150623A (en) Malicious user SSDF attack method and system are resisted based on repeating query credit value
Wang et al. An enhanced cooperative spectrum sensing scheme for anti-SSDF attack based on evidence theory
Orumwense¹ et al. Improving trustworthiness amongst nodes in cognitive radio networks
Wang et al. ALRT‐based energy detection using uniform noise distribution
Singh et al. Cognitive radio spectrum sensing technique using M-ary QAM for different fading environments
CN108494510A (en) Decision fusion method under non-ideal report channel based on optimal weighting coefficients
Zhang et al. Estimating the distance between macro base station and users in heterogeneous networks

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant