Correlation Based Secondary Users Selection for Cooperative Spectrum Sensing Network

Author(s):  
Yifu Zhang ◽  
Wenxun Zhao ◽  
Dawei Wang ◽  
Daosen Zhai ◽  
Xiao Tang
2020 ◽  
Vol 2020 ◽  
pp. 1-9 ◽  
Author(s):  
S. Tephillah ◽  
J. Martin Leo Manickam

Security is a pending challenge in cooperative spectrum sensing (CSS) as it employs a common channel and a controller. Spectrum sensing data falsification (SSDF) attacks are challenging as different types of attackers use them. To address this issue, the sifting and evaluation trust management algorithm (SETM) is proposed. The necessity of computing the trust for all the secondary users (SUs) is eliminated based on the use of the first phase of the algorithm. The second phase is executed to differentiate the random attacker and the genuine SUs. This reduces the computation and overhead costs. Simulations and complexity analyses have been performed to prove the efficiency and appropriateness of the proposed algorithm for combating SSDF attacks.


2018 ◽  
Vol 7 (2.20) ◽  
pp. 335
Author(s):  
Shweta Alpna ◽  
Amrit Mukherjee ◽  
Amlan Datta

The proposed work illustrates a novel technique for cooperative spectrum sensing in a cognitive radio (CR) network. The work includes an approach of identifying secondary users (SUs) based on Hierarchical Maximum Likelihood (HML) technique followed by Vector Quantization. Initially, the arrangement of the SUs are been observed using HML with respect to a spatial domain and then the active SUs among them are identified using VQ. The approach will not only save the energy, but the decision of the real-time and dynamic cooperative communication network becomes more accurate as we can predict the behavior of SUs movement and spectrum sensing by each individual SU at that particular  place. The results and simulations of the real-time experiment justifies with the proposed approach. 


2020 ◽  
Author(s):  
Rahil Sarikhani ◽  
Farshid Keynia

Abstract Cognitive Radio (CR) network was introduced as a promising approach in utilizing spectrum holes. Spectrum sensing is the first stage of this utilization which could be improved using cooperation, namely Cooperative Spectrum Sensing (CSS), where some Secondary Users (SUs) collaborate to detect the existence of the Primary User (PU). In this paper, to improve the accuracy of detection Deep Learning (DL) is used. In order to make it more practical, Recurrent Neural Network (RNN) is used since there are some memory in the channel and the state of the PUs in the network. Hence, the proposed RNN is compared with the Convolutional Neural Network (CNN), and it represents useful advantages to the contrast one, which is demonstrated by simulation.


2017 ◽  
Vol 2017 ◽  
pp. 1-14 ◽  
Author(s):  
Teddy Febrianto ◽  
Jiancao Hou ◽  
Mohammad Shikh-Bahaei

In asynchronous cognitive networks (CNs), where there is no synchronization between primary users (PUs) and secondary users (SUs), spectrum sensing becomes a challenging task. By combining cooperative spectrum sensing and full-duplex (FD) communications in asynchronous CNs, this paper demonstrates improvements in terms of the average throughput of both PUs and SUs for particular transmission schemes. The average throughputs are derived for SUs and PUs under different FD schemes, levels of residual self-interference, and number of cooperative SUs. In particular, we consider two types of FD schemes, namely, FD transmit-sense-reception (FDr) and FD transmit-sense (FDs). FDr allows SUs to transmit and receive data simultaneously, whereas, in FDs, the SUs continuously sense the channel during the transmission time. This paper shows the respective trade-offs and obtains the optimal scheme based on cooperative FD spectrum sensing. In addition, SUs’ average throughput is analyzed under different primary channel utilization and multichannel sensing schemes. Finally, new FD MAC protocol design is proposed and analyzed for FD cooperative spectrum sensing. We found optimum parameters for our proposed MAC protocol to achieve higher average throughput in certain applications.


2015 ◽  
Vol 15 (7) ◽  
pp. 3807-3818 ◽  
Author(s):  
Maryam Najimi ◽  
Ata Ebrahimzadeh ◽  
Seyed Mehdi Hosseini Andargoli ◽  
Afshin Fallahi

Sign in / Sign up

Export Citation Format

Share Document