skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: An Energy-Detection-Based Cooperative Spectrum Sensing Scheme for Minimizing the Effects of NPEE and RSPF
For improved spectrum utilization, the key technique for acquiring spectrum situational awareness (SSA) — spectrum sensing — is greatly improved by cooperation among the active spectrum users, as network size increases. However, the many cooperative spectrum sensing (CSS) schemes that have been proposed are based on the assumptions of accurate noise power estimates, characterizable variation in noise level and absence of false or malicious users. As part of a series of SSA research projects, in this research work, we propose a novel scheme for minimizing the effects of noise power estimation error (NPEE) and received signal power falsification (RSPF) by energy-based reliability evaluation. The scheme adopts the Voting rule for fusing multiple spectrum sensing data. Based on simulation results, the proposed scheme yields significant improvement, 68.2—88.8%, over the conventional CSS schemes, when compared on the basis of the schemes’ stability to uncertainties in noise and signal power.  more » « less
Award ID(s):
1454835
PAR ID:
10024806
Author(s) / Creator(s):
; ; ; ;
Date Published:
Journal Name:
Proceedings of the 19th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems - MSWiM '16
Page Range / eLocation ID:
318 to 322
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. Wyld, David C; Nagamalai, Dhinaharan (Ed.)
    The proliferation of 5G technologies and the vast deployment of Internet of Things (IoT) devices have heightened the demand for optimal spectrum utilization, necessitating robust spectrum management strategies. In this context, an efficient energy detector employing wideband spectrum sensing within a 5G environment is essential for identifying underutilized frequency bands suitable for cognitive radio applications across multiple subbands. While cooperative spectrum sensing (CSS) can enhance the detection capabilities of energy detectors amidst noise uncertainty, its performance often deteriorates under low signal-to-noise ratio (SNR) conditions. This study proposes an improved CSS framework that combines Maximal Ratio Combining (MRC) with the K-out-of-N fusion rule to address noise uncertainty in a complex Gaussian environment across multiple sub-bands in cooperative wideband spectrum sensing. Comparative performance analysis confirms that this integrated approach enhances detection probability and maintains a low false alarm rate across various low SNR scenarios, significantly outperforming traditional cooperative and non-cooperative wideband spectrum sensing methods. These results highlight the potential for advancing cognitive radio technologies by optimizing detection algorithms to improve performance under challenging conditions. 
    more » « less
  2. Spectrum sensing enables secondary users in a cognitive radio network to opportunistically access portions of the spectrum left idle by primary users. Tracking spectrum holes jointly in time and frequency over a wide spectrum band is a challenging task. In one approach to wideband temporal sensing, the spectrum band is partitioned into narrowband subchannels of fixed bandwidth, which are then characterized via hidden Markov modeling using average power or energy measurements as observation data. Adjacent, correlated subchannels are recursively aggregated into channels of variable bandwidths, corresponding to the primary user signals. Thus, wideband temporal sensing is transformed into a multiband sensing scenario by identifying the primary user channels in the spectrum band. However, future changes in the configuration of the primary user channels in the multiband setup cannot generally be detected using an energy detector front end for spectrum sensing. We propose the use of a cepstral feature vector to detect changes in the spectrum envelope of a primary user channel. Our numerical results show that the cepstrum-based spectrum envelope detector performs well under moderate to high signal-to-noise ratio conditions. 
    more » « less
  3. We present a novel scheme for cache-aided communication over multiple-input and single output (MISO) cellular networks. The presented scheme achieves the same number of degrees of freedom as known coded caching schemes, but, at much lower complexity. The scheme is derived for communication systems with heterogeneous rates and finite signal-to-noise ratio, in which links are modeled by wideband fading channels. The base station is serving multiple users simultaneously, by sending a combination of several packets, each intended for one user. The interference is either suppressed using the cache content or nulled by zero-forcing at the unintended users. We focus on efficient coding schemes, which allow for a maximum number of users to be served throughout the course of communication. An achievable rate region is characterized by determining the extreme rate vectors satisfying an efficient transmission. The analysis results in a simple scheduling scheme and in a closed-form performance analysis. 
    more » « less
  4. Orthogonal blinding based schemes for wireless physical layer security aim to achieve secure communication by injecting noise into channels orthogonal to the main channel and corrupting the eavesdropper’s signal reception. These methods, albeit practical, have been proven vulnerable against multiantenna eavesdroppers who can filter the message from the noise. The venerability is rooted in the fact that the main channel state remains stasis in spite of the noise injection, which allows an eavesdropper to estimate it promptly via known symbols and filter out the noise. Our proposed scheme leverages a reconfigurable antenna for Alice to rapidly change the channel state during transmission and a compressive sensing based algorithm for her to predict and cancel the changing effects for Bob. As a result, the communication between Alice and Bob remains clear, whereas randomized channel state prevents Eve from launching the knownplaintext attack. We formally analyze the security of the scheme against both single and multi-antenna eavesdroppers and identify its unique anti-eavesdropping properties due to the artificially created fast changing channel. We conduct extensive simulations and real-world experiments to evaluate its performance. Empirical results show that our scheme can suppress Eve’s attack success rate to the level of random guessing, even if she knows all the symbols transmitted through other antenna modes. 
    more » « less
  5. This study investigates the problem of decentralized dynamic resource allocation optimization for ad-hoc network communication with the support of reconfigurable intelligent surfaces (RIS), leveraging a reinforcement learning framework. In the present context of cellular networks, device-to-device (D2D) communication stands out as a promising technique to enhance the spectrum efficiency. Simultaneously, RIS have gained considerable attention due to their ability to enhance the quality of dynamic wireless networks by maximizing the spectrum efficiency without increasing the power consumption. However, prevalent centralized D2D transmission schemes require global information, leading to a significant signaling overhead. Conversely, existing distributed schemes, while avoiding the need for global information, often demand frequent information exchange among D2D users, falling short of achieving global optimization. This paper introduces a framework comprising an outer loop and inner loop. In the outer loop, decentralized dynamic resource allocation optimization has been developed for self-organizing network communication aided by RIS. This is accomplished through the application of a multi-player multi-armed bandit approach, completing strategies for RIS and resource block selection. Notably, these strategies operate without requiring signal interaction during execution. Meanwhile, in the inner loop, the Twin Delayed Deep Deterministic Policy Gradient (TD3) algorithm has been adopted for cooperative learning with neural networks (NNs) to obtain optimal transmit power control and RIS phase shift control for multiple users, with a specified RIS and resource block selection policy from the outer loop. Through the utilization of optimization theory, distributed optimal resource allocation can be attained as the outer and inner reinforcement learning algorithms converge over time. Finally, a series of numerical simulations are presented to validate and illustrate the effectiveness of the proposed scheme. 
    more » « less