scholarly journals Performance Metrics in Cognitive Radio Networks

2021 ◽  
Vol 36 (1) ◽  
pp. 73-79
Author(s):  
Mahmoud Ali Ammar

In Cognitive Radio Networks (CRN), the main aim is to allow the secondary users (SUs) to identify the empty bands and use them to transmit or receive data opportunistically. Primary users (PUs) have the priority to use a channel, while the secondary users must vacant this channel once a primary user requests it. An attack known in cognitive radio networks as a Primary User Emulation Attack (PUEA) aims to prevent the SU from using the empty bands. In this paper, an analytical and experimental approach is presented to mitigate the PUEA. This approach is based on obtaining the Probability Density Functions (PDFs) of the received powers at the secondary users from malicious nodes and also from the primary transmitter in the cognitive network. Then, these obtained PDFs are used in Neyman-Pearson composite hypothesis test to measure the performance metrics (probability of false alarm and miss detection in the network). The results proved that the performance metrics were greatly influenced by the network area, where the secondary user is located, and the threshold value λ used in the decision rule. Also, there are boundaries for the λ choices that cannot be overtaken.

Author(s):  
Monisha Ravi ◽  
Nisha Ravi ◽  
N. Ravi

Recently, the expansive growth of wireless services, regulated by governmental agencies assigning spectrum to licensed users, has led to a shortage of radio spectrum. Since the FCC (Federal Communications Commissions) approved unlicensed users to access the unused channels of the reserved spectrum, new research areas seeped in, to develop Cognitive Radio Networks (CRN), in order to improve spectrum efficiency and to exploit this feature by enabling secondary users to gain from the spectrum in an opportunistic manner via optimally distributed traffic demands over the spectrum, so as to reduce the risk for monetary loss, from the unused channels. However, Cognitive Radio Networks become vulnerable to various classes of threats that decrease the bandwidth and spectrum usage efficiency. Hence, this survey deals with defining and demonstrating framework of one such attack called the Primary User Emulation Attack and suggests preventive Sensing Protocols to counteract the same. It presents a scenario of the attack and its prevention using Network Simulator-2 for the attack performances and gives an outlook on the various techniques defined to curb the anomaly.


2017 ◽  
Vol 30 (18) ◽  
pp. e3371 ◽  
Author(s):  
Kuldeep Yadav ◽  
Binod Prasad ◽  
Abhijit Bhowmick ◽  
Sanjay Dhar Roy ◽  
Sumit Kundu

Sign in / Sign up

Export Citation Format

Share Document