Primary User Boundary Detection in Cognitive Radio Networks: Estimated Secondary User Locations and Impact of Malicious Secondary Users
نویسنده
چکیده
Cognitive radio is an effective technology to improve spectrum utilization through spectrum sharing among primary users (PUs) and secondary users (SUs). Developing accurate and efficient methods to determine the PU coverage is crucial in order to avoid potential interference from SU to PU. In this paper, we propose to use the estimated location of each SU, which is obtained using the self-organizing maps (SOM) algorithm, to determine the boundary of PU coverage. Furthermore, the PU boundary detection issue considering the presence of malicious SUs is also investigated. Support vector machine (SVM) algorithm, considering both linear and kernel cases, is implemented as the PU boundary detection method. Numerical results show that the boundary detection accuracy based on the estimated network layout approaches the results obtained from an accurate network layout (i.e., each SU with precise location information) and the kernel based SVM classification results outperform the linear SVM method. In addition, PU boundary detection performance in the presence of malicious SUs is evaluated, in which three different K nearest neighbor (K-NN) based malicious SU detection algorithms are utilized.
منابع مشابه
Secure Collaborative Spectrum Sensing in the Presence of Primary User Emulation Attack in Cognitive Radio Networks
Collaborative Spectrum Sensing (CSS) is an effective approach to improve the detection performance in Cognitive Radio (CR) networks. Inherent characteristics of the CR have imposed some additional security threats to the networks. One of the common threats is Primary User Emulation Attack (PUEA). In PUEA, some malicious users try to imitate primary signal characteristics and defraud the CR user...
متن کاملSpectrum Sensing Data Falsification Attack in Cognitive Radio Networks: An Analytical Model for Evaluation and Mitigation of Performance Degradation
Cognitive Radio (CR) networks enable dynamic spectrum access and can significantly improve spectral efficiency. Cooperative Spectrum Sensing (CSS) exploits the spatial diversity between CR users to increase sensing accuracy. However, in a realistic scenario, the trustworthy of CSS is vulnerable to Spectrum Sensing Data Falsification (SSDF) attack. In an SSDF attack, some malicious CR users deli...
متن کاملSecuring Collaborative Spectrum Sensing against Untrustworthy Secondary Users in Cognitive Radio Networks
Cognitive radio is a revolutionary paradigm to migrate the spectrum scarcity problem in wireless networks. In cognitive radio networks, collaborative spectrum sensing is considered as an effective method to improve the performance of primary user detection. For current collaborative spectrum sensing schemes, secondary users are usually assumed to report their sensing information honestly. Howev...
متن کاملInvestigation of Always Present and Spectrum Sensing based Incumbent Emulators
Cognitive radio (CR) technology has been suggested for effective use of spectral resources. Spectrum sensing is one of the main operations of CR users to identify the vacant frequency bands. Cooperative spectrum sensing (CSS) is used to increase the performance of CR networks by providing spatial diversity. The accuracy of spectrum sensing is the most important challenge in the CSS process sinc...
متن کاملDetecting Selfish Secondary User for Improving the Performance of Cognitive Radio Network by Using Sad Method
Cognitive radio (CR) is an opportunistic communication technology which is designed to utilize the maximum available licensed bandwidth for unlicensed users. In CR, when the spectrum is not used by primary user, it is accessed by the unlicensed users/secondary users. . In CRN a selfish SU (secondary user) broadcasts faked channel allocation information to other neighboring SUs in order to occup...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017