Using satellites to complete spectrum monitoring tasks can effectively receive and process electromagnetic spectrum signals emitted by radiation sources.However,due to the shortage of satellite storage,computing and n...Using satellites to complete spectrum monitoring tasks can effectively receive and process electromagnetic spectrum signals emitted by radiation sources.However,due to the shortage of satellite storage,computing and network resources,the intersatellite coordination is weak,and with the massive growth of spectrum data,the traditional cloud computing mode cannot meet the requirements of electromagnetic spectrum monitoring in terms of real-time,bandwidth,and security.We apply edge computing technology and deep learning technology to the satellite.Aiming at the problems of distributed satellite management and control,we propose a space-based distributed electromagnetic spectrum monitoring intelligent connected cloud-edge collaborative architecture SpaceEdge.SpaceEdge applies edge computing and artificial intelligence technology to space-based spectrum monitoring.SpaceEdge deploys intelligent monitoring algorithms to edge nodes to form edge intelligent satellite,and uses the cloud to uniformly manage and control heterogeneous edge satellite and monitor satellite resources.In addition,SpaceEdge can also adjust edge intelligent spectrum monitoring applications as needed to achieve effective coordination of inter-satellite algorithms and data to achieve the purpose of collaborative monitoring.Finally,SpaceEdge was experimentally verified,and the results proved the feasibility of SpaceEdge and can improve the timeliness and autonomy of the distributed satellite’s coordinated signal monitoring.展开更多
This paper studies the proactive spec-trum monitoring with one half-duplex spectrum moni-tor(SM)to cope with the potential suspicious wireless powered communications(SWPC)in dynamic spec-trum sharing networks.The jamm...This paper studies the proactive spec-trum monitoring with one half-duplex spectrum moni-tor(SM)to cope with the potential suspicious wireless powered communications(SWPC)in dynamic spec-trum sharing networks.The jamming-assisted spec-trum monitoring scheme via spectrum monitoring data(SMD)transmission is proposed to maximize the sum ergodic monitoring rate at SM.In SWPC,the suspi-cious communications of each data block occupy mul-tiple independent blocks,with a block dedicated to the wireless energy transfer by the energy-constrained suspicious nodes with locations in a same cluster(symmetric scene)or randomly distributed(asymmet-ric scene)and the remaining blocks used for the in-formation transmission from suspicious transmitters(STs)to suspicious destination(SD).For the sym-metric scene,with a given number of blocks for SMD transmission,namely the jamming operation,we first reveal that SM should transmit SMD signal(jam the SD)with tolerable maximum power in the given blocks.The perceived suspicious signal power at SM could be maximized,and thus so does the correspond-ing sum ergodic monitoring rate.Then,we further reveal one fundamental trade-off in deciding the op-timal number of given blocks for SMD transmission.For the asymmetric scene,a low-complexity greedy block selection scheme is proposed to guarantee the optimal performance.Simulation results show that the jamming-assisted spectrum monitoring schemes via SMD transmission achieve much better perfor-mance than conventional passive spectrum monitor-ing,since the proposed schemes can obtain more accu-rate and effective spectrum characteristic parameters,which provide basic support for fine-grained spectrum management and a solution for spectrum security in dynamic spectrum sharing network.展开更多
Cooperative spectrum monitoring with multiple sensors has been deemed as an efficient mechanism for improving the monitoring accuracy and enlarging the monitoring area in wireless sensor networks.However,there exists ...Cooperative spectrum monitoring with multiple sensors has been deemed as an efficient mechanism for improving the monitoring accuracy and enlarging the monitoring area in wireless sensor networks.However,there exists redundancy among the spectrum data collected by a sensor node within a data collection period,which may reduce the data uploading efficiency.In this paper,we investigate the inter-data commonality detection which describes how much two data have in common.We define common segment set and divide it into six categories firstly,then a method to measure a common segment set is conducted by extracting commonality between two files.Moreover,the existing algorithms fail in finding a good common segment set,so Common Data Measurement(CDM)algorithm that can identify a good common segment set based on inter-data commonality detection is proposed.Theoretical analysis proves that CDM algorithm achieves a good measurement for the commonality between two strings.In addition,we conduct an synthetic dataset which are produced randomly.Numerical results shows that CDM algorithm can get better performance in measuring commonality between two binary files compared with Greedy-String-Tiling(GST)algorithm and simple greedy algorithm.展开更多
The Space-Air-Ground-Sea Integrated Networks(SAGSIN)significantly enhance global communication by merging satellite,aviation,terrestrial,and marine networks.Crucial to SAGSIN’s functionality and security is spectrum ...The Space-Air-Ground-Sea Integrated Networks(SAGSIN)significantly enhance global communication by merging satellite,aviation,terrestrial,and marine networks.Crucial to SAGSIN’s functionality and security is spectrum monitoring using deep learning-based Automatic Modulation Classification(AMC),essential for processing and classifying complex modulation signals.However,these AMC models are susceptible to adversarial attacks.Thus,we introduce the Deep Time-Frequency Denoising Transformation(DTFDT)defense method to mitigate the impact of adversarial attacks.The DTFDT method is comprised of a deep denoising module and a transformation module.The denoising module maps signals into the time-frequency domain,amplifying the differences between benign and adversarial examples,aiding in the elimination of adversarial perturbations.Concurrently,the transformation module develops a learnable network,generating example-specific transformation matrices suited for signal data,which diminishes the effectiveness of attacks.Extensive evaluations on two datasets,RML2016.10a and DMRadio09.real,demonstrate the superior defense capabilities of DTFDT against various attacks.展开更多
文摘Using satellites to complete spectrum monitoring tasks can effectively receive and process electromagnetic spectrum signals emitted by radiation sources.However,due to the shortage of satellite storage,computing and network resources,the intersatellite coordination is weak,and with the massive growth of spectrum data,the traditional cloud computing mode cannot meet the requirements of electromagnetic spectrum monitoring in terms of real-time,bandwidth,and security.We apply edge computing technology and deep learning technology to the satellite.Aiming at the problems of distributed satellite management and control,we propose a space-based distributed electromagnetic spectrum monitoring intelligent connected cloud-edge collaborative architecture SpaceEdge.SpaceEdge applies edge computing and artificial intelligence technology to space-based spectrum monitoring.SpaceEdge deploys intelligent monitoring algorithms to edge nodes to form edge intelligent satellite,and uses the cloud to uniformly manage and control heterogeneous edge satellite and monitor satellite resources.In addition,SpaceEdge can also adjust edge intelligent spectrum monitoring applications as needed to achieve effective coordination of inter-satellite algorithms and data to achieve the purpose of collaborative monitoring.Finally,SpaceEdge was experimentally verified,and the results proved the feasibility of SpaceEdge and can improve the timeliness and autonomy of the distributed satellite’s coordinated signal monitoring.
基金the Natural Science Foun-dations of China(No.62171464,61771487)the Defense Science Foundation of China(No.2019-JCJQ-JJ-221).
文摘This paper studies the proactive spec-trum monitoring with one half-duplex spectrum moni-tor(SM)to cope with the potential suspicious wireless powered communications(SWPC)in dynamic spec-trum sharing networks.The jamming-assisted spec-trum monitoring scheme via spectrum monitoring data(SMD)transmission is proposed to maximize the sum ergodic monitoring rate at SM.In SWPC,the suspi-cious communications of each data block occupy mul-tiple independent blocks,with a block dedicated to the wireless energy transfer by the energy-constrained suspicious nodes with locations in a same cluster(symmetric scene)or randomly distributed(asymmet-ric scene)and the remaining blocks used for the in-formation transmission from suspicious transmitters(STs)to suspicious destination(SD).For the sym-metric scene,with a given number of blocks for SMD transmission,namely the jamming operation,we first reveal that SM should transmit SMD signal(jam the SD)with tolerable maximum power in the given blocks.The perceived suspicious signal power at SM could be maximized,and thus so does the correspond-ing sum ergodic monitoring rate.Then,we further reveal one fundamental trade-off in deciding the op-timal number of given blocks for SMD transmission.For the asymmetric scene,a low-complexity greedy block selection scheme is proposed to guarantee the optimal performance.Simulation results show that the jamming-assisted spectrum monitoring schemes via SMD transmission achieve much better perfor-mance than conventional passive spectrum monitor-ing,since the proposed schemes can obtain more accu-rate and effective spectrum characteristic parameters,which provide basic support for fine-grained spectrum management and a solution for spectrum security in dynamic spectrum sharing network.
基金supported in part by the National Natural Science Foundation of China(No.61901328)the China Postdoctoral Science Foundation (No. 2019M653558)+1 种基金the Fundamental Research Funds for the Central Universities (No. CJT150101)the Key project of National Natural Science Foundation of China (No. 61631015)
文摘Cooperative spectrum monitoring with multiple sensors has been deemed as an efficient mechanism for improving the monitoring accuracy and enlarging the monitoring area in wireless sensor networks.However,there exists redundancy among the spectrum data collected by a sensor node within a data collection period,which may reduce the data uploading efficiency.In this paper,we investigate the inter-data commonality detection which describes how much two data have in common.We define common segment set and divide it into six categories firstly,then a method to measure a common segment set is conducted by extracting commonality between two files.Moreover,the existing algorithms fail in finding a good common segment set,so Common Data Measurement(CDM)algorithm that can identify a good common segment set based on inter-data commonality detection is proposed.Theoretical analysis proves that CDM algorithm achieves a good measurement for the commonality between two strings.In addition,we conduct an synthetic dataset which are produced randomly.Numerical results shows that CDM algorithm can get better performance in measuring commonality between two binary files compared with Greedy-String-Tiling(GST)algorithm and simple greedy algorithm.
文摘The Space-Air-Ground-Sea Integrated Networks(SAGSIN)significantly enhance global communication by merging satellite,aviation,terrestrial,and marine networks.Crucial to SAGSIN’s functionality and security is spectrum monitoring using deep learning-based Automatic Modulation Classification(AMC),essential for processing and classifying complex modulation signals.However,these AMC models are susceptible to adversarial attacks.Thus,we introduce the Deep Time-Frequency Denoising Transformation(DTFDT)defense method to mitigate the impact of adversarial attacks.The DTFDT method is comprised of a deep denoising module and a transformation module.The denoising module maps signals into the time-frequency domain,amplifying the differences between benign and adversarial examples,aiding in the elimination of adversarial perturbations.Concurrently,the transformation module develops a learnable network,generating example-specific transformation matrices suited for signal data,which diminishes the effectiveness of attacks.Extensive evaluations on two datasets,RML2016.10a and DMRadio09.real,demonstrate the superior defense capabilities of DTFDT against various attacks.