scholarly journals An Effective Adaptive Threshold Based Compressive Spectrum Sensing in Cognitive Radio Networks

2021 ◽  
Vol 9 (1) ◽  
pp. 1220-1224
Author(s):  
S. Varalakshmi, K. Senthil Kumar, A. K. Gnanasekar, S. Sureshkrishna

Spectrum sensing is playing a vital role in Cognitive Radio networks. Wideband spectrum sensing increases the speed of sensing but which in turn requires higher sampling rate and also increases the complexity of hardware and also power consumption. Compression based sensing reduces the sampling rate by using Sub-Nyquist sampling but the compression and the reconstruction problem exists. In compression based spectrum sensing, noise uncertainty is one of the major performance degradation factor. To reduce this degradation, compressive measurements based sensing with adaptive threshold is proposed. In this technique compressed signal is sensed without any reconstruction of the signal. When the nodes are mobile in the low SNR region, the noise uncertainty degrades the performance of spectrum sensing. To conquer this problem, noise variance is estimated using parametric estimation technique and the threshold is varied adaptively. In the low SNR region, this proposed technique reduces the effect of noise and improves the spectrum sensing performance.

Electronics ◽  
2021 ◽  
Vol 10 (11) ◽  
pp. 1346
Author(s):  
Xinyu Xie ◽  
Zhuhua Hu ◽  
Min Chen ◽  
Yaochi Zhao ◽  
Yong Bai

Spectrum is a kind of non-reproducible scarce strategic resource. A secure wideband spectrum sensing technology provides the possibility for the next generation of ultra-dense, ultra-large-capacity communications to realize the shared utilization of spectrum resources. However, for the open collaborative sensing in cognitive radio networks, the collusion attacks of malicious users greatly affect the accuracy of the sensing results and the security of the entire network. To address this problem, this paper proposes a weighted fusion decision algorithm by using the blockchain technology. The proposed algorithm divides the single-node reputation into active reputation and passive reputation. Through the proposed token threshold concept, the active reputation is set to increase the malicious cost of the node; the passive reputation of the node is determined according to the historical data and recent performance of the blockchain. The final node weight is obtained by considering both kinds of reputation. The proposed scheme can build a trust-free platform for the cognitive radio collaborative networks. Compared with the traditional equal-gain combination algorithm and the centralized sensing algorithm based on the beta reputation system, the simulation results show that the proposed algorithm can obtain reliable sensing results with a lower number of assistants and sampling rate, and can effectively resist malicious users’ collusion attacks. Therefore, the security and the accuracy of cooperative spectrum sensing can be significantly improved in cognitive radio networks.


2021 ◽  
Vol 166 ◽  
pp. 234-243
Author(s):  
Peng Feng ◽  
Yuebin Bai ◽  
Yuhao Gu ◽  
Jun Huang ◽  
Xiaolin Wang ◽  
...  

2019 ◽  
Vol 2019 ◽  
pp. 1-9 ◽  
Author(s):  
Muhammad Sajjad Khan ◽  
Muhammad Jibran ◽  
Insoo Koo ◽  
Su Min Kim ◽  
Junsu Kim

Cognitive radio (CR) is being considered as a vital technology to provide solution to spectrum scarcity in next generation network, by efficiently utilizing the vacant spectrum of the licensed users. Cooperative spectrum sensing in cognitive radio network has a promising performance compared to the individual sensing. However, the existence of the malicious users’ attack highly degrades the performance of the cognitive radio networks by sending falsified data also known as spectrum sensing data falsification (SSDF) to the fusion center. In this paper, we propose a double adaptive thresholding technique in order to differentiate legitimate users from doubtful and malicious users. Prior to the double adaptive approach, the maximal ratio combining (MRC) scheme is utilized to assign weight to each user such that the legitimate users experience higher weights than the malicious users. Double adaptive threshold is applied to give a fair chance to the doubtful users to ensure their credibility. A doubtful user that fails the double adaptive threshold test is declared as a malicious user. The results of the legitimate users are combined at the fusion center by utilizing Dempster-Shafer (DS) evidence theory. Effectiveness of the proposed scheme is proved through simulations by comparing with the existing schemes.


Sign in / Sign up

Export Citation Format

Share Document