scholarly journals One-to-Many Relationship Based Kullback Leibler Divergence against Malicious Users in Cooperative Spectrum Sensing

2018 ◽  
Vol 2018 ◽  
pp. 1-14 ◽  
Author(s):  
Noor Gul ◽  
Ijaz Mansoor Qureshi ◽  
Sadiq Akbar ◽  
Muhammad Kamran ◽  
Imtiaz Rasool

The centralized cooperative spectrum sensing (CSS) allows unlicensed users to share their local sensing observations with the fusion center (FC) for sensing the licensed user spectrum. Although collaboration leads to better sensing, malicious user (MU) participation in CSS results in performance degradation. The proposed technique is based on Kullback Leibler Divergence (KLD) algorithm for mitigating the MUs attack in CSS. The secondary users (SUs) inform FC about the primary user (PU) spectrum availability by sending received energy statistics. Unlike the previous KLD algorithm where the individual SU sensing information is utilized for measuring the KLD, in this work MUs are identified and separated based on the individual SU decision and the average sensing statistics received from all other users. The proposed KLD assigns lower weights to the sensing information of MUs, while the normal SUs information receives higher weights. The proposed method has been tested in the presence of always yes, always no, opposite, and random opposite MUs. Simulations confirm that the proposed KLD scheme has surpassed the existing soft combination schemes in estimating the PU activity.

2018 ◽  
Vol 2018 ◽  
pp. 1-11 ◽  
Author(s):  
Noor Gul ◽  
Ijaz Mansoor Qureshi ◽  
Atif Elahi ◽  
Imtiaz Rasool

In cognitive radio network (CRN), secondary users (SUs) try to sense and utilize the vacant spectrum of the legitimate primary user (PU) in an efficient manner. The process of cooperation among SUs makes the sensing more authentic with minimum disturbance to the PU in achieving maximum utilization of the vacant spectrum. One problem in cooperative spectrum sensing (CSS) is the occurrence of malicious users (MUs) sending false data to the fusion center (FC). In this paper, the FC takes a global decision based on the hard binary decisions received from all SUs. Genetic algorithm (GA) using one-to-many neighbor distance along with z-score as a fitness function is used for the identification of accurate sensing information in the presence of MUs. The proposed scheme is able to avoid the effect of MUs in CSS without identification of MUs. Four types of abnormal SUs, opposite malicious user (OMU), random opposite malicious user (ROMU), always yes malicious user (AYMU), and always no malicious user (ANMU), are discussed in this paper. Simulation results show that the proposed hard fusion scheme has surpassed the existing hard fusion scheme, equal gain combination (EGC), and maximum gain combination (MGC) schemes by employing GA.


2020 ◽  
Author(s):  
Rahil Sarikhani ◽  
Farshid Keynia

Abstract Cognitive Radio (CR) network was introduced as a promising approach in utilizing spectrum holes. Spectrum sensing is the first stage of this utilization which could be improved using cooperation, namely Cooperative Spectrum Sensing (CSS), where some Secondary Users (SUs) collaborate to detect the existence of the Primary User (PU). In this paper, to improve the accuracy of detection Deep Learning (DL) is used. In order to make it more practical, Recurrent Neural Network (RNN) is used since there are some memory in the channel and the state of the PUs in the network. Hence, the proposed RNN is compared with the Convolutional Neural Network (CNN), and it represents useful advantages to the contrast one, which is demonstrated by simulation.


2012 ◽  
Vol 195-196 ◽  
pp. 277-282
Author(s):  
Hui Heng Liu ◽  
Wei Chen

This paper proposes a novel weighted-cooperative spectrum sensing scheme using clustering for cognitive radio system. We firstly classify the secondary users into a few clusters according to several existent methods, and then use cluster-head to collect the observation results come from different secondary users in the same cluster and make a cluster-decision. Considering the different distances between the clusters and the fusion center, different weightings are used to weight the cluster-decisions before combining. The simulation results show that our proposed method improve the probability of detection and reduce the probability of error.


Author(s):  
Hoai Trung Tran

Currently, the cognitive network is receiving much attention due to the advantages it brings to users. An important method in cognitive radio networks is spectrum sensing, as it allows secondary users (SUs) to detect the existence of a primary user (PU). Information of probability of false detection or warning about the PU is sent to a fusion center (FC) by the SUs, from which the FC will decide whether or not to allow the SUs to use the PU spectrum to obtain information. The transmission of information with a high signal to noise ratio (SNR) will increase the FC's ability to detect the existence of the PU. However, researchers are currently focusing on probabilistic formulas assuming that the channel is known ideally or there is nominal channel information at the FC; moreover, one model where the FC only knows the channel correlation matrix. Furthermore, studies are still assuming this is a simple multiple input – multiple output (MIMO) channel model but do not pay much attention to the signal processing at the transmitting and receiving antennas between the SUs and the FCs. A new method introduced in this paper when combining beamforming and hierarchical codebook makes the ability to detect the existence of the PU at the FC significantly increased compared to traditional methods.


2020 ◽  
Vol 2020 ◽  
pp. 1-11 ◽  
Author(s):  
Muhammad Sajjad Khan ◽  
Liaqat Khan ◽  
Noor Gul ◽  
Muhammad Amir ◽  
Junsu Kim ◽  
...  

Cognitive radio is an intelligent radio network that has advancement over traditional radio. The difference between the traditional radio and the cognitive radio is that all the unused frequency spectrum can be utilized to the best of available resources in the cognitive radio unlike the traditional radio. The core technology of cognitive radio is spectrum sensing, in which secondary users (SUs) opportunistically access the spectrum while avoiding interference to primary user (PU) channels. Various aspects of the spectrum sensing have been studied from the perspective of cognitive radio. Cooperative spectrum sensing (CSS) technique provides a promising performance, compared with individual sensing techniques. However, the existence of malicious users (MUs) highly degrades the performance of cognitive radio network (CRN) by sending falsified results to a fusion center (FC). In this paper, we propose a machine learning algorithm based on support vector machine (SVM) to classify legitimate SUs and MUs in the CRN. The proposed SVM-based algorithm is used for both classification and regression. It clearly classifies legitimate SUs and MUs by drawing a hyperplane on the base of maximal margin. After successful classification, the sensing results from the legitimate SUs are combined at the FC by utilizing Dempster-Shafer (DS) evidence theory. The effectiveness of the proposed SVM-based classification algorithm is demonstrated through simulations, compared with existing schemes.


2021 ◽  
Author(s):  
BALACHANDER T ◽  
Mukesh Krishnan M B

Abstract In the recent past, efficient cooperative spectrum sensing and usage are playing a vital role in wireless communication because of the significant progress of mobile devices. There is a recent surge and interest on Non-Orthogonal Multiple Access (NOMA) focused on communication powered by wireless mode. In modern research, more attention has been focused on efficient and accurate Non-Orthogonal Multiple Access (NOMA). NOMA wireless communication is highly adapted with Cognitive Radio Network (CRN) for improving performance. In the existing cognitive radio network, the secondary users could be able to access the idle available spectrum while primary users are engaged. In the traditional CRN, the primary user’s frequency bands are sensed as free, the secondary users could be utilized those bands of frequency resources. In this research, the novel methodology is proposed for cooperative spectrum sensing in CRN for 5G wireless communication using NOMA. The higher cooperative spectrum efficiency can be detected in the presence of channel noise. Cooperative spectrum sensing is used to improve the efficient utilization of spectrum. The spectrum bands with license authority primary user are shared by Secondary Users (SU) by simultaneously transmitting information with Primary Users (PU). The cooperative spectrum sensing provides well under the circumstances that the different channel interference to the primary user can be guaranteed to be negligible than an assured thresholding value. The Noisy Channel State Information (CSI) like AWGN and Rayleigh fading channels are considered as wireless transmission mediums for transmitting a signal using Multiple-Input-Multiple-Output (MIMO) NOMA to increase the number of users. The proposed NOMA is fascinated with significant benefits in CRN is an essential wireless communication method for upcoming 5G technology. From experimental results it has been proved that the novel methodology performance is efficient and accurate than existing methodologies by showing graphical representations and tabulated parameters.


2012 ◽  
Vol 433-440 ◽  
pp. 5218-5222
Author(s):  
Xue Qiang Zheng ◽  
Juan Chen ◽  
Xin Wang ◽  
Fan Jun Kong

Cooperative spectrum sensing under network overhead constraints is studied. To protect the primary user well, the detection probability must exceed the predefined threshold. Based on the protection of the primary user, the constraints on optimal number of cognitive users are defined by weighting the detection performance and the usage efficiency in a target function. The analysis of the target function is given under energy fusion strategy in the fusion center. The simulation results show the validity of the constraints.


2021 ◽  
Vol 8 (2) ◽  
pp. 92-100
Author(s):  
Laila Nassef ◽  
Reemah Alhebshi ◽  

Cognitive radio is a promising technology to solve the spectrum scarcity problem caused by inefficient utilization of radio spectrum bands. It allows secondary users to opportunistically access the underutilized spectrum bands assigned to licensed primary users. The local individual spectrum detection is inefficient, and cooperative spectrum sensing is employed to enhance spectrum detection accuracy. However, cooperative spectrum sensing opens up opportunities for new types of security attacks related to the cognitive cycle. One of these attacks is the spectrum sensing data falsification attack, where malicious secondary users send falsified sensing reports about spectrum availability to mislead the fusion center. This internal attack cannot be prevented using traditional cryptography mechanisms. To the best of our knowledge, none of the previous work has considered both unreliable communication environments and the spectrum sensing data falsification attack for cognitive radio based smart grid applications. This paper proposes a fuzzy inference system based on four conflicting descriptors. An attack model is formulated to determine the probability of detection for both honest and malicious secondary users. It considers four independent malicious secondary users’ attacking strategies of always yes, always no, random, and opposite attacks. The performance of the proposed fuzzy fusion system is simulated and compared with the conventional fusion rules of AND, OR, Majority, and the reliable fuzzy fusion that does not consider the secondary user’s sensing reputation. The results indicate that incorporating sensing reputation in the fusion center has enhanced the accuracy of spectrum detection and have prevented malicious secondary users from participating in the spectrum detection fusion


2021 ◽  
Author(s):  
venkateshkumar Udayamoorthy ◽  
Ramakrishnan Sriniva

Abstract In this paper, a cooperative spectrum sensing (CSS) model is proposed to sense n-number of primary users (PUs) using n-number secondary users (SUs) in a sequence by applying support vector machine (SVM) algorithm using three different kernels namely linear, polynomial and radial basis function (RBF) respectively. In this method, fusion centre (FC) instructs all the SUs through control channel, which PU is to be sensed by sending a pre-defined primary user identification code (PUid) and each SU sense the Kth PU spectrum information and stored in a database at FC. SU transmits a bit ‘0’ or bit ‘1’ along with PU sensing information to the FC to indicate whether it needs a spectrum band to transmit the data or not. SU add two identification codes along with sensing information to the FC which indicates that from which SU the sensing information received and which PU is sensed by the SU. For simulation 500 data samples are used and the simulation results show an accuracy of 96% and false alarm value of 1.3% in classifying the SU sensing information at FC using RBF kernel. Another method is proposed with multiclass classification by applying SVM algorithm using RBF kernel. The confusion region class is classified with zero false alarm percentage and achieves an accuracy of 99.3% in classifying the SU sensing information at FC.


2021 ◽  
Vol 11 (5) ◽  
pp. 2362
Author(s):  
Muhammad Sajjad Khan ◽  
Mohammad Faisal ◽  
Su Min Kim ◽  
Saeed Ahmed ◽  
Marc St-Hilaire ◽  
...  

Cooperative spectrum sensing (CSS) is a vital part of cognitive radio networks, which ensures the existence of the primary user (PU) in the network. However, the presence of malicious users (MUs) highly degrades the performance of the system. In the proposed scheme, each secondary user (SU) reports to the fusion center (FC) with a hard decision of the sensing energy to indicate the existence of the PU. The main contribution of this work deals with MU attacks, specifically spectrum sensing data falsification (SSDF) attacks. In this paper, we propose a correlation-based approach to differentiate between the SUs and the outliers by determining the sensing of each SU, and the average value of sensing information with other SUs, to predict the SSDF attack in the system. The FC determines the abnormality of a SU by determining the similarity for each SU with the remaining SUs by following the proposed scheme and declares the SU as an outlier using the box-whisker plot. The effectiveness of the proposed scheme was demonstrated through simulations.


Sign in / Sign up

Export Citation Format

Share Document