scholarly journals Preventing Cognitive User Emulation Attack in Cognitive Radio Network by Calculating Trust Values Using Fuzzy Logic

Author(s):  
Spriha Pandey* ◽  
Ashawani Kumar

Cognitive radio has proved to be an efficient and promising technology for the future of wireless networks. Its major and fundamental aim is to utilize the spectrum bands which are not efficiently exercised. These bands can be accessed using Opportunistic Spectrum Access (OSA), by a secondary user only when primary user is not transmitting over the channel. Cognitive radio manages spectrum through its cognitive radio cycle, which performs a set of management functions such as, spectrum sensing, spectrum assignment, spectrum sharing and spectrum mobility/handoff. During this cycle, at several stages, cognitive radio is very much vulnerable to security attacks. This is also due to the exposed nature of cognitive radio architecture. One such security attack which has not been much explored and can cause serious security issues is Cognitive User Emulation Attack (CUEA). This attack is expected to occur at the time of spectrum handoff. In this article the reason of occurrence of CUEA is explained along with counter measures to prevent this threat in the network by implementing trust mechanism using fuzzy logic. The proposed system is simulated and analyzed using MATLAB tool.

The faster development of wireless communications has made the spectrum ending up with increasingly with more shortage. The idea of CR was proposed to meet the problem of spectrum effectiveness. In the cognitive networks, the SUs are permitted to detect, distinguish and access the frequency bands that are not at present used by the PU’s. the SU’s must outfit with the spectrum access information to use the primary user’s licence in the home region network. We propose a maximum throughput and power based cognitive radio for home region systems (HAN). At the point when there are different SU’s and numerous channels, spectrum sharing must be taken into account. In this paper we additionally propose a system of multiple channel sensing. We consider the interference to PU brought about by the dynamic access and the erroneous spectrum sensing technique. We investigate the obstruction brought about by the secondary user’s through a reestablishment hypothesis. Under the limitation of interference to primary user, the queuing theory is used to overcome this issue and to obtain the higher data rate of SU’s. finally, it is demonstrated that the cyclostationary detection method can be improved when extra channels are accessible.


2019 ◽  
Vol 2019 ◽  
pp. 1-8 ◽  
Author(s):  
Kedir Mamo Besher ◽  
Juan-Ivan Nieto-Hipolito ◽  
Mabel Vazquez Briseno ◽  
Raymundo Buenrostro Mariscal

After an introduction of cognitive radio (CR) technology in communication, the hot research topics are sensing, Primary User Interference (PUI), spectrum management, security, spectrum sharing, and environmental sensing. Among the listed, sensing and Primary User Interference are the bold ones. The base query for these two problems lays finding a means for which and what channel at a particular time is available and avoiding interference with Primary Users (PU). This article presents a novel cognitive radio algorithm called SenPUI for both mentioned main challenges, sensing and PUI. First, energy scan during the inactive portion of communication which is dynamic is done. Second, application packet based primary user identification for PUI avoidance is proposed as base solution. Both techniques described in this work are implemented and resulted in a significant reduction of the target problems estimated around 10-30% reduction in average. Main limitations of Wireless Sensor Network (WSN) such as memory, battery lifetime, and size are considered during the design and implementation of our solutions.


Cognitive radio automatically detects the available channel in the wireless communication and has an adaptive radio technology network. It also changes the transmission parameters to run concurrently for more smooth communication. CR network allows the user to utilize the band in an opportunistic manner because it has different characteristics like capabilities and re-configurability. In this article, it shown the methodology, on how the primary user and the secondary user should communicate to provide error free communication. And also the framework on how to overcome the unique challenges occurred in the spectrum management like interference avoidance, QoS awareness and seamless communication. We also discussed about spectrum mobility, spectrum sharing, spectrum decision, and also spectrum sensing which are the characteristics of spectrum management


Cognitive Radio (CR) is a technology that promises to solve the data transmission problem by allowing secondary users to coexist with primary user without causing any interference to the communication. It means to improve the usage of the radio assets to improve the throughput. Despite the fact that the operational parts of CR are being investigated broadly, its security viewpoints have increased little consideration. In this work, present a CRN architecture , Different Protocol, with complete rundown of major known security dangers and assaults inside a Cognitive Radio Network (CRN). Our goal in this paper is to dissect the distinctive security issues of the primary ongoing advancements of Cognitive Radio Networks with proper resource allocation to improve the throughput.


2021 ◽  
Author(s):  
Sivasothy Sen Senthuran

In recent studies it was found out that previously allocated frequency spectrum is not fully utilized in all the wireless systems. Cognitive radio is the new concept to access this underutilized spectrum and, also a promising technology to cope with the ever increasing bandwidth demand for next generation wireless networks. Cognitive radio network can be classified into three different categories: interweave, underlay and overlay. In an interweave cognitive radio system, the unoccupied spectrum holes can be shared by cognitive users with minimal collision with primary users (spectrum owners) whereas in an underlay system, concurrent transmission is allowed with an interference threshold to the primary users. In an underlay system, cognitive users generally transmit at very low power. In an overlay system, cognitive users, similar to underlay cognitive radio systems, concurrently transmit with primary users but cognitive users may know the codewords of the primary transmitter. Hence, using that knowledge, cognitive transmitter may adopt different coding techniques to cancel/mitigate the interference at the primary receiver and/or it may assist the primary system by relaying primary user’s data. In this thesis, we improve the throughput/bit error rate performance of a cognitive radio system by effectively accessing the channels. Throughout the thesis we assume that cognitive user can sense only one channel at a time and we analyze the performance with perfect and imperfect sensing. First, we propose a novel opportunistic access scheme for cognitive radios in an interweave cognitive system, that considers the channel gain as well as the predicted idle channel probability (primary user occupancy: busy/idle). In contrast to previous work where a cognitive user vacates a channel only when that channel becomes busy, the proposed scheme requires the cognitive user to switch to the channel with the next highest idle probability if the current channel’s gain is below a certain threshold. We derive the threshold values that maximize the long term throughput for various primary user transition probabilities and cognitive user’s relative movement (Doppler spread). Then, we propose a three state Markov model to analyze the performance of a hybrid interweave-underlay system where the primary user’s occupancy states are hidden, but their activity statistics, ranges of transmission, and interference thresholds are known. The primary user is assumed to be in one of the three transmission modes as seen by the cognitive user: busy, concurrent and idle. We derive the transmission mode selection criteria (interweave/underlay) to improve the long term throughput of a cognitive user based on the primary user traffic characteristics and the achievable throughput ratio between the two modes of operation. Later, we incorporate the sensing error in our analysis where we study the optimal access strategy. Since the optimal policy requires the channel to be sensed in each time-slot, we propose and analyze a forward algorithm based cross-layer frame based sensing policy. Finally, we focus on the overlay cognitive radio system where cognitive relay nodes assist the primary transmission. As an initial study, we select a two-hop decode-and-forward orthogonal frequency and code division multiplexing based relay network. For this system, we propose adaptive channel allocation and, power allocation strategies and the bit error rate performance is numerically evaluated. This preliminary analysis can be extended to overlay cognitive systems.


2018 ◽  
Vol 2018 ◽  
pp. 1-16
Author(s):  
Mohammed Hawa ◽  
Fahed Jubair ◽  
Raed Al-Zubi ◽  
Ramzi Saifan

A novel approach to managing a fully distributed cognitive radio network (CRN) is presented. This approach builds on the concept of history-based spectrum access, in which cognitive base stations (BSs) independently estimate the system load using history records and adaptively swap their occupied spectrum bands to ensure allocation fairness and high overall throughput. In addition, cognitive BSs monitor primary user (PU) behavior in order to avoid interfering with active PUs. In this work, we address two issues that afflict history-based access: the first is the high cost of the sensing devices needed at each cognitive BS to be able to independently draw conclusions about the status of the CRN and the second is the unreliability inherent in practical sensing hardware (such as energy detectors). Simulation results show that the proposed technique manages to solve the two abovementioned issues without any noticeable drop in performance and without sacrificing the distributed nature of the protocol.


Author(s):  
Rita Mahajan ◽  
Deepak Bagai

<p>The future of wireless system is facing the problem of spectrum scarcity. Number of users is increasing rapidly but available spectrum is limited. The Cognitive Radio (CR) network technology can enable the unlicensed users to share the frequency spectrum with the licensed users on a dynamic basis without creating any interference to primary user. Whenever secondary user finds that primary user is not transmitting and channel is free then it uses channel opportunistically. In this paper cognitive radio with predictive capability using artificial neural network has been proposed. The advantage of such cognitive user is saving of time and energy for spectrum sensing. Proposed radio will sense only that channel which is predicted to be free and channel is selected on the basis of maximum vacant time. Performance has been evaluated in the term of mean square error. The results show that this learning capability can be embedded in secondary users for better performance of future wireless technologies.  </p>


2021 ◽  
Author(s):  
Sivasothy Sen Senthuran

In recent studies it was found out that previously allocated frequency spectrum is not fully utilized in all the wireless systems. Cognitive radio is the new concept to access this underutilized spectrum and, also a promising technology to cope with the ever increasing bandwidth demand for next generation wireless networks. Cognitive radio network can be classified into three different categories: interweave, underlay and overlay. In an interweave cognitive radio system, the unoccupied spectrum holes can be shared by cognitive users with minimal collision with primary users (spectrum owners) whereas in an underlay system, concurrent transmission is allowed with an interference threshold to the primary users. In an underlay system, cognitive users generally transmit at very low power. In an overlay system, cognitive users, similar to underlay cognitive radio systems, concurrently transmit with primary users but cognitive users may know the codewords of the primary transmitter. Hence, using that knowledge, cognitive transmitter may adopt different coding techniques to cancel/mitigate the interference at the primary receiver and/or it may assist the primary system by relaying primary user’s data. In this thesis, we improve the throughput/bit error rate performance of a cognitive radio system by effectively accessing the channels. Throughout the thesis we assume that cognitive user can sense only one channel at a time and we analyze the performance with perfect and imperfect sensing. First, we propose a novel opportunistic access scheme for cognitive radios in an interweave cognitive system, that considers the channel gain as well as the predicted idle channel probability (primary user occupancy: busy/idle). In contrast to previous work where a cognitive user vacates a channel only when that channel becomes busy, the proposed scheme requires the cognitive user to switch to the channel with the next highest idle probability if the current channel’s gain is below a certain threshold. We derive the threshold values that maximize the long term throughput for various primary user transition probabilities and cognitive user’s relative movement (Doppler spread). Then, we propose a three state Markov model to analyze the performance of a hybrid interweave-underlay system where the primary user’s occupancy states are hidden, but their activity statistics, ranges of transmission, and interference thresholds are known. The primary user is assumed to be in one of the three transmission modes as seen by the cognitive user: busy, concurrent and idle. We derive the transmission mode selection criteria (interweave/underlay) to improve the long term throughput of a cognitive user based on the primary user traffic characteristics and the achievable throughput ratio between the two modes of operation. Later, we incorporate the sensing error in our analysis where we study the optimal access strategy. Since the optimal policy requires the channel to be sensed in each time-slot, we propose and analyze a forward algorithm based cross-layer frame based sensing policy. Finally, we focus on the overlay cognitive radio system where cognitive relay nodes assist the primary transmission. As an initial study, we select a two-hop decode-and-forward orthogonal frequency and code division multiplexing based relay network. For this system, we propose adaptive channel allocation and, power allocation strategies and the bit error rate performance is numerically evaluated. This preliminary analysis can be extended to overlay cognitive systems.


Author(s):  
Krešimir Dabcevic ◽  
Lucio Marcenaro ◽  
Carlo S. Regazzoni

While potentially solving the spectrum underutilization problem using methods such as dynamic and opportunistic spectrum access, Cognitive Radios (CRs) also bring a set of security issues and potential breaches that have to be addressed. These issues come from the two important capabilities implemented within CRs: their cognition ability and reconfigurability. This chapter focuses on identifying, presenting, and classifying the main potential security attacks and vulnerabilities, as well as proposing appropriate counter-measures and solutions for them. These are supplemented by simulation results and metrics, with the intention of estimating the efficiency of each of the observed attacks and its counter-measure. The presented simulations are performed in the proprietary C/C++ and Matlab/Simulink simulators. nSHIELD is a major ongoing European embedded systems security-related project, which is used to demonstrate the practicability of the potential implementation of the proposed countermeasures and solutions for the discussed security problems and issues.


2017 ◽  
Vol 13 (10) ◽  
pp. 5899-5904
Author(s):  
A. Narendra Kumar

Cognitive Radio (CR) has become a hopeful technology to enhance the spectrum  utilization  through spectrum sharing between licensed user (primary user) and unlicensed user (secondary user). An vital rule mandated for the development of such frameworks are to develop solutions that don’t require any changes to the existing primary user (PU) infrastructure. An Orthogonal Frequency Division Multiplexing (OFDM) is typically worn advancements in present wireless communication systems which has the possibility of fulfilling the demand for cognitive radios intrinsically or with slight changes. In this paper, Space time block codes is used. The various antennas used on both ends for trustworthy data broadcast and interference nulling schemes. These codes can accomplish full broadcast diversification determined via the number of broadcast antennas. The MIMO is worn for enhancing the power of a wireless link, to determine the issue for lower BER and achieve a superior performance.


Sign in / Sign up

Export Citation Format

Share Document