A trust-value based cooperative spectrum sensing algorithm for mobile secondary users

Author(s):  
Xinyu Wang ◽  
Min Jia ◽  
Qing Guo ◽  
Xuemai Gu
2019 ◽  
Vol 2019 ◽  
pp. 1-11 ◽  
Author(s):  
Feng Zhao ◽  
Shaoping Li ◽  
Jingyu Feng

Cooperative spectrum sensing (CSS) has been recognized as a forceful approach to promote the utilization of spectrum bands. Nevertheless, all secondary users (SU) are assumed as honest in CSS, thus giving opportunities for attackers to launch the spectrum sensing data falsification (SSDF) attack. To defend against such attack, many efforts have been made to trust mechanism. In this paper, we argue that securing CSS with only trust mechanism is not enough and report the description of dynamic-collusive SSDF attack (DC-SSDF attack). To escape the detection of trust mechanism, DC-SSDF attackers can maintain high trust by submitting true sensing data dynamically and then fake sensing data in the collaborative manner to increase their attack strength. Noting that the resonance phenomenon may appear in the trust value curve of DC-SSDF attackers, a defense scheme called TFCA is proposed from the design idea of trust fluctuation clustering analysis to suppress DC-SSDF attack. In the TFCA scheme, the decreasing property of trust value in the resonance phenomenon is adopted to measure the similarity distance between two attackers. Based on the similarity distance computation, the binary clustering algorithm is designed by electing initial binary samples to identify DC-SSDF attackers. Finally, trust mechanism can be perfected by TFCA to correct DC-SSDF attackers’ trust value. Simulation results show that our TFCA scheme can improve the accuracy of trust value calculation, thus reducing the strength of DC-SSDF attack successfully.


2020 ◽  
Vol 2020 ◽  
pp. 1-9 ◽  
Author(s):  
S. Tephillah ◽  
J. Martin Leo Manickam

Security is a pending challenge in cooperative spectrum sensing (CSS) as it employs a common channel and a controller. Spectrum sensing data falsification (SSDF) attacks are challenging as different types of attackers use them. To address this issue, the sifting and evaluation trust management algorithm (SETM) is proposed. The necessity of computing the trust for all the secondary users (SUs) is eliminated based on the use of the first phase of the algorithm. The second phase is executed to differentiate the random attacker and the genuine SUs. This reduces the computation and overhead costs. Simulations and complexity analyses have been performed to prove the efficiency and appropriateness of the proposed algorithm for combating SSDF attacks.


2018 ◽  
Vol 7 (2.20) ◽  
pp. 335
Author(s):  
Shweta Alpna ◽  
Amrit Mukherjee ◽  
Amlan Datta

The proposed work illustrates a novel technique for cooperative spectrum sensing in a cognitive radio (CR) network. The work includes an approach of identifying secondary users (SUs) based on Hierarchical Maximum Likelihood (HML) technique followed by Vector Quantization. Initially, the arrangement of the SUs are been observed using HML with respect to a spatial domain and then the active SUs among them are identified using VQ. The approach will not only save the energy, but the decision of the real-time and dynamic cooperative communication network becomes more accurate as we can predict the behavior of SUs movement and spectrum sensing by each individual SU at that particular  place. The results and simulations of the real-time experiment justifies with the proposed approach. 


2020 ◽  
Author(s):  
Rahil Sarikhani ◽  
Farshid Keynia

Abstract Cognitive Radio (CR) network was introduced as a promising approach in utilizing spectrum holes. Spectrum sensing is the first stage of this utilization which could be improved using cooperation, namely Cooperative Spectrum Sensing (CSS), where some Secondary Users (SUs) collaborate to detect the existence of the Primary User (PU). In this paper, to improve the accuracy of detection Deep Learning (DL) is used. In order to make it more practical, Recurrent Neural Network (RNN) is used since there are some memory in the channel and the state of the PUs in the network. Hence, the proposed RNN is compared with the Convolutional Neural Network (CNN), and it represents useful advantages to the contrast one, which is demonstrated by simulation.


2017 ◽  
Vol 2017 ◽  
pp. 1-14 ◽  
Author(s):  
Teddy Febrianto ◽  
Jiancao Hou ◽  
Mohammad Shikh-Bahaei

In asynchronous cognitive networks (CNs), where there is no synchronization between primary users (PUs) and secondary users (SUs), spectrum sensing becomes a challenging task. By combining cooperative spectrum sensing and full-duplex (FD) communications in asynchronous CNs, this paper demonstrates improvements in terms of the average throughput of both PUs and SUs for particular transmission schemes. The average throughputs are derived for SUs and PUs under different FD schemes, levels of residual self-interference, and number of cooperative SUs. In particular, we consider two types of FD schemes, namely, FD transmit-sense-reception (FDr) and FD transmit-sense (FDs). FDr allows SUs to transmit and receive data simultaneously, whereas, in FDs, the SUs continuously sense the channel during the transmission time. This paper shows the respective trade-offs and obtains the optimal scheme based on cooperative FD spectrum sensing. In addition, SUs’ average throughput is analyzed under different primary channel utilization and multichannel sensing schemes. Finally, new FD MAC protocol design is proposed and analyzed for FD cooperative spectrum sensing. We found optimum parameters for our proposed MAC protocol to achieve higher average throughput in certain applications.


2012 ◽  
Vol 195-196 ◽  
pp. 277-282
Author(s):  
Hui Heng Liu ◽  
Wei Chen

This paper proposes a novel weighted-cooperative spectrum sensing scheme using clustering for cognitive radio system. We firstly classify the secondary users into a few clusters according to several existent methods, and then use cluster-head to collect the observation results come from different secondary users in the same cluster and make a cluster-decision. Considering the different distances between the clusters and the fusion center, different weightings are used to weight the cluster-decisions before combining. The simulation results show that our proposed method improve the probability of detection and reduce the probability of error.


2019 ◽  
Vol 8 (3) ◽  
pp. 5176-5182

Sensing based spectrum allocation is one of the solutions to bridge the gap between spectrum scarcity and underutilization of allocated spectrum. In this context, cognitive radio technology has become the prominent solution for future wireless communication problems. To accurately detect the spectrum availability, CRN uses cooperative spectrum sensing where N number of selected nodes will be involved in making a decision on spectrum occupation. Various sensing parameters such as sensing duration (τ), decision threshold (λ), number of nodes (N) and decision rule (K) have huge impact on the performance of cooperative spectrum sensing. In addition, there are constraints on energy consumption and protection of licensed user’s needs to be considered. Our work focuses on optimization of sensing parameters to maximize the throughput of the cognitive radio network maintaining the energy efficiency and protecting the licensed users from the interference caused by the secondary users. The proposed work uses convex optimization to optimize sensing duration and two-dimensional search algorithm to find the values N and K. Further optimization is done by comparing local decision with cooperative decision.


Author(s):  
Hoai Trung Tran

Currently, the cognitive network is receiving much attention due to the advantages it brings to users. An important method in cognitive radio networks is spectrum sensing, as it allows secondary users (SUs) to detect the existence of a primary user (PU). Information of probability of false detection or warning about the PU is sent to a fusion center (FC) by the SUs, from which the FC will decide whether or not to allow the SUs to use the PU spectrum to obtain information. The transmission of information with a high signal to noise ratio (SNR) will increase the FC's ability to detect the existence of the PU. However, researchers are currently focusing on probabilistic formulas assuming that the channel is known ideally or there is nominal channel information at the FC; moreover, one model where the FC only knows the channel correlation matrix. Furthermore, studies are still assuming this is a simple multiple input – multiple output (MIMO) channel model but do not pay much attention to the signal processing at the transmitting and receiving antennas between the SUs and the FCs. A new method introduced in this paper when combining beamforming and hierarchical codebook makes the ability to detect the existence of the PU at the FC significantly increased compared to traditional methods.


Sign in / Sign up

Export Citation Format

Share Document