A Reliable Cooperative Spectrum Sensing Strategy for Cognitive Radios

2013 ◽  
Vol 347-350 ◽  
pp. 1773-1779
Author(s):  
Shou Tao Lv ◽  
Ze Yang Dai ◽  
Jian Liu

In cognitive radio networks (CRNs), the secondary users (SUs) need to continuously detect whether the primary users (PUs) occupy the spectrum. In order to improve the spectrum sensing accuracy, a novel reliable cooperative spectrum sensing strategy based on the detection results relayed twice from the secondary relays (SRs) to the secondary source (SS), referred to as CSS-DRT, is proposed in this paper. In this scheme, the spectrum sensing slot is divided into four equal sub-slots. In the first and third sub-slots, the SS and SRs detect the PU by themselves. Then, in the second sub-slot, if the SRs that detect the PU during the first sub-slot are more than or equal to a prespecified quantity, the corresponding SRs will send their flag signals (FSs) to the SS while the others keep quiet, where the FS is narrowband and indicates that the PU is present. Otherwise, if the SRs that detect the PU during the first sub-slot are less than the prespecified quantity, all the SRs will keep quiet in the second sub-slot. Meanwhile, the SS detects the PU based on the received signals from the PU and SRs. And, the SS uses the same method as employed in the second sub-slot to detect the PU in the last sub-slot wherein the SRs send their FSs based on their detections made during the third sub-slot. Finally, an ultimate decision is made by the OR ruler based on the SS detection results obtained during the spectrum sensing slot. Besides, we derive the closed-form expressions of the false alarm and detection probabilities for the proposed CSS-DRT scheme. In the end, simulation and numerical results show that our proposed scheme can achieve better performance than the non-cooperative method and an existing cooperative spectrum sensing method.

2020 ◽  
Vol 2020 ◽  
pp. 1-9 ◽  
Author(s):  
S. Tephillah ◽  
J. Martin Leo Manickam

Security is a pending challenge in cooperative spectrum sensing (CSS) as it employs a common channel and a controller. Spectrum sensing data falsification (SSDF) attacks are challenging as different types of attackers use them. To address this issue, the sifting and evaluation trust management algorithm (SETM) is proposed. The necessity of computing the trust for all the secondary users (SUs) is eliminated based on the use of the first phase of the algorithm. The second phase is executed to differentiate the random attacker and the genuine SUs. This reduces the computation and overhead costs. Simulations and complexity analyses have been performed to prove the efficiency and appropriateness of the proposed algorithm for combating SSDF attacks.


2018 ◽  
Vol 7 (2.20) ◽  
pp. 335
Author(s):  
Shweta Alpna ◽  
Amrit Mukherjee ◽  
Amlan Datta

The proposed work illustrates a novel technique for cooperative spectrum sensing in a cognitive radio (CR) network. The work includes an approach of identifying secondary users (SUs) based on Hierarchical Maximum Likelihood (HML) technique followed by Vector Quantization. Initially, the arrangement of the SUs are been observed using HML with respect to a spatial domain and then the active SUs among them are identified using VQ. The approach will not only save the energy, but the decision of the real-time and dynamic cooperative communication network becomes more accurate as we can predict the behavior of SUs movement and spectrum sensing by each individual SU at that particular  place. The results and simulations of the real-time experiment justifies with the proposed approach. 


2013 ◽  
Vol 4 (4) ◽  
pp. 1-15
Author(s):  
Yanxiao Zhao ◽  
Bighnaraj Panigrahi ◽  
Kazem Sohraby ◽  
Wei Wang

Cognitive radio networks (CRNs) have received considerable attention and viewed as a promising paradigm for future wireless networking. Its major difference from the traditional wireless networks is that secondary users are allowed to access the channel if they pose no harmful interference to primary users. This distinct feature of CRNs has raised an essential and challenging question, i.e., how to accurately estimate interference to the primary users from the secondary users? In addition, spectrum sensing plays a critical role in CRNs. Secondary users have to sense the channel before they transmit. A two-state sensing model is commonly used, which classifies a channel into either busy or idle state. Secondary users can only utilize a channel when it is detected to be in idle state. In this paper, we tackle the estimation of interference at the primary receiver due to concurrently active secondary users. With the spectrum sensing, secondary users are refrained from transmitting once an active user falls into their sensing range. As a result, the maximum number of simultaneously interfering secondary users is bounded, typically ranging from 1 to 4. This significant conclusion considerably simplifies interference modeling in CRNs. The authors present all the cases with possible simultaneously interfering secondary users. Moreover, the authors derive the probability for each case. Extensive simulations are conducted and results validate the effectiveness and accuracy of the proposed approach.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Suneetha Ch ◽  
Srinivasa Rao S ◽  
K.S. Ramesh

PurposeElectronic devices aid communication during new communication phases and the scope of cognitive radio networks has changed communication paradigms through efficient use of spectrums. The communication prototype of cognitive radio networks defines user roles as primary user and secondary user in the context of the spectrum allocation and use. The users who have licensed authority of the spectrum are denoted as primary users, while other eligible users who access the corresponding spectrum are secondary users.Design/methodology/approachThe multiple factors of transmission service quality can have a negative influence due to improper scheduling of spectrum bands between primary users and secondary users. There are considerable contributions in contemporary literature concerning spectrum band scheduling under spectrum sensing. However, the majority of the scheduling models are intended to manage a limited number of transmission service quality factors. Moreover, these service quality factors are functional and derived algorithmically from the current corresponding spectrum. However, there is evidence of credible performance deficiency regarding contemporary spectrum sensing methodsFindingsThis article intends to portray a fuzzy guided integrated factors-based spectrum band sharing within the spectrum used by secondary users. This study attempts to explain the significance of this proposal compared to other contemporary models.Originality/valueThis article intends to portray a fuzzy guided integrated factors-based spectrum band sharing within the spectrum used by secondary users. This study attempts to explain the significance of this proposal compared to other contemporary models.


Frequenz ◽  
2012 ◽  
Vol 66 (7-8) ◽  
Author(s):  
Hang Hu ◽  
Ning Li ◽  
Youyun Xu

AbstractTo improve the sensing performance, cooperation among secondary users can be utilized to collect space diversity. We focus on the optimization of cooperative spectrum sensing in which multiple secondary users efficiently cooperate to achieve superior detection accuracy with minimum sensing error probability in heterogeneous cognitive radio (CR) networks. Rayleigh fading and Nakagami fading are considered respectively in cognitive network I and cognitive network II. For each cognitive network, we derive the optimal randomized rule for different decision threshold. Then, the optimal decision threshold is derived according to the rule of minimum sensing error (MSE). MSE rule shows better performance on improving the final false alarm and detection probability simultaneously. By simulations, our proposed strategy optimizes the sensing performance for each secondary user which is randomly distributed in the heterogeneous cognitive radio networks.


2015 ◽  
Vol 2015 ◽  
pp. 1-12 ◽  
Author(s):  
Hui Lin ◽  
Jia Hu ◽  
Chuan Huang ◽  
Li Xu ◽  
Bin Wu

Cognitive radio networks (CRNs) are an emerging wireless communications technique for resolving the significant spectrum scarcity problem. Despite their promising characteristics, CRNs also introduce new security threats, especially the internal attacks during the spectrum sensing and allocation process, which can degrade the efficiency of spectrum sensing and allocation. To address this issue, this paper proposes a distributed secure cooperative spectrum sensing strategy (DSCS) based on a dynamic reputation model to defend against attacks and provide reliable spectrum sensing. Moreover, the reputation values are used as weights in a novel distributed cheat-proof spectrum allocation strategy (DCSA) based on the Vickrey-Clarke-Groves (VCG) mechanism. Both theoretical analysis and simulation results indicate that the proposed DSCS and DCSA strategies can provide an effective countermeasure against the internal spectrum sensing data falsification (SSDF) attacks through enabling secondary users to obtain more accurate cooperative sensing results in adversarial environments.


2013 ◽  
Vol 765-767 ◽  
pp. 1423-1426
Author(s):  
Yang Liu ◽  
Ying Cui ◽  
Ou Li

In cognitive radio networks, cooperative sensing has been identified as an important technique in MAC-layer sensing. Intuitively, the more secondary users (SUs) are involved in sensing, the more sensing accuracy the SUs can achieve, whereas the more reporting delay the SUs consume, the less throughput the SUs can achieve. Thus, an important issue associated with SUs is how to maximize the SUs throughput under the constraint that the Primary Users (PUs) are sufficiently protected. To solve this issue, we develop a new sensing scheme to decrease the consumption of reporting delay and prove the unimodal characteristics of the SUs average throughput as a function of the fusion parameters based on the k-out-of-N fusion rule. Computer simulations show that, based on the developed sensing scheme and the proposed numerical optimization algorithm, significant improvement in the average throughput of SUs is achieved.


Sign in / Sign up

Export Citation Format

Share Document