Cooperative Spectrum Sensing under Imperfect Channel Estimation

Author(s):  
Qing-hua Shen ◽  
Xuan-li Wu ◽  
Xue-jun Sha ◽  
Nai-tong Zhang
Author(s):  
Srinivas Nallagonda ◽  
Sanjay Dhar Roy ◽  
Sumit Kundu ◽  
Gianluigi Ferrari ◽  
Riccardo Raheli

In this chapter, the authors study the performance of Cooperative Spectrum Sensing (CSS) with soft data fusion, given by Maximal Ratio Combining (MRC)-based fusion with Weibull faded channels, and Log-normal shadowed channels. More precisely, they evaluate the performance of a MRC-based CSS with Cognitive Radios (CRs) censored on the basis of the quality of the reporting channels. The performance of CSS with two censoring schemes, namely rank-based and threshold-based, is studied in the presence of Weibull fading, Rayleigh fading, and Log-normal shadowing in the reporting channels, considering MRC fusion. The performance is compared with those of schemes based on hard decision fusion rules. Furthermore, depending on perfect or imperfect Minimum Mean Square Error (MMSE) channel estimation, the authors analyze the impact of channel estimation strategy on the censoring schemes. The performance is studied in terms of missed detection probability as a function of several network, fading, and shadowing parameters.


2020 ◽  
Vol 2020 ◽  
pp. 1-9 ◽  
Author(s):  
S. Tephillah ◽  
J. Martin Leo Manickam

Security is a pending challenge in cooperative spectrum sensing (CSS) as it employs a common channel and a controller. Spectrum sensing data falsification (SSDF) attacks are challenging as different types of attackers use them. To address this issue, the sifting and evaluation trust management algorithm (SETM) is proposed. The necessity of computing the trust for all the secondary users (SUs) is eliminated based on the use of the first phase of the algorithm. The second phase is executed to differentiate the random attacker and the genuine SUs. This reduces the computation and overhead costs. Simulations and complexity analyses have been performed to prove the efficiency and appropriateness of the proposed algorithm for combating SSDF attacks.


Sign in / Sign up

Export Citation Format

Share Document