skip to main content

Attention:

The NSF Public Access Repository (PAR) system and access will be unavailable from 11:00 PM ET on Friday, December 13 until 2:00 AM ET on Saturday, December 14 due to maintenance. We apologize for the inconvenience.


Title: Mitigation of the spectrum sensing data falsifying attack in cognitive radio networks
Cognitive radio networks (CRNs), which offer novel network architecture for utilising spectrums, have attracted significant attention in recent years. CRN users use spectrums opportunistically, which means they sense a channel, and if it is free, they start transmitting in that channel. In cooperative spectrum sensing, a secondary user (SU) decides about the presence of the primary user (PU) based on information from other SUs. Malicious SUs (MSUs) send false sensing information to other SUs so that they make wrong decisions about the spectrum status. As a result, an SU may transmit during the presence of the PU or may keep starving for the spectrum. In this paper, we propose a reputation-based mechanism which can minimise the effects of MSUs on decision making in cooperative spectrum sensing. Some of the SUs are selected as distributed fusion centres (DFCs), that are responsible for making decisions about the presence of PU and informing the reporting SUs. A DFC uses weighted majority voting among the reporting SUs, where weights are normalised reputation. The DFC updates reputations of SUs based on confidence of an election. If the majority wins by a significant margin, the confidence of the election is high. In this case, SUs that belong to the majority gain high reputations. We conduct extensive simulations to validate our proposed model.  more » « less
Award ID(s):
1824494 1824440
PAR ID:
10196972
Author(s) / Creator(s):
; ; ;
Date Published:
Journal Name:
Cyber-Physical Systems
ISSN:
2333-5777
Page Range / eLocation ID:
1 to 20
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. Cognitive radio networks, a.k.a. dynamic spectrum access networks, offer a promising solution to the problems of spectrum scarcity and under-utilization. In this paper, we consider two single-user links: primary and secondary links. To increase secondary user (SU) transmission opportunities and increase primary user (PU) throughput, we consider a cognitive relay network where a SU relays PU packets that are unsuccessfully received at the primary receiver (PR). At the PR side, two protocols are suggested: i) energy accumulation (EA), and ii) mutual-information accumulation (MIA). The average stable throughput of the secondary link is derived under these protocols for a specific throughput selected by the primary link. Results show that EA and MIA can significantly improve the secondary throughput compared with the no accumulation scenario, especially under extreme environment. 
    more » « less
  2. null (Ed.)
    In this letter, we investigate the idea of interference spreading and its effect on bit error rate (BER) performance in a cognitive radio network (CRN). The interference spreading phenomenon is caused because of the random allocation of subcarriers in an orthogonal frequency division multiplexing (OFDM)-based CRN without any spectrum-sensing mechanism. The CRN assumed in this work is of underlay configuration, where the frequency bands are accessed concurrently by both primary users (PUs) and secondary users (SUs). With random allocation, subcarrier collisions occur among the carriers of primary users (PUs) and secondary users (SUs), leading to interference among subcarriers. This interference caused by subcarrier collisions spreads out across multiple subcarriers of PUs rather than on an individual PU, therefore avoiding high BER for an individual PU. Theoretical and simulated signal to interference and noise ratio (SINR) for collision and no-collision cases are validated for M-quadrature amplitude modulation (M-QAM) techniques. Similarly, theoretical BER performance expressions are found and compared for M-QAM modulation orders under Rayleigh fading channel conditions. The BER for different modulation orders of M-QAM are compared and the relationship of average BER with interference temperature is also explored further. 
    more » « less
  3. Abstract—The mainstay of current spectrum access grants exclusive rights to proprietary occupants who exhibit tidal traffic patterns, leading to low usage of valuable spectrum resources. To remedy this situation, Dynamic Spectrum Access (DSA) is proposed to allow Secondary Users (SUs) to opportunistically exploit idle spectrum slices left by Primary Users (PUs). The key to the success of DSA lies in SUs’ knowledge on radio activities of PUs. To enhance the understanding of PU spectrum tenancy patterns, various mathematical models have been proposed to describe spectrum occupancy dynamics. However, there are still two overlooked aspects in existing studies on spectrum tenancy modeling, i.e., time-varying spectrum tenancy patterns and multi- ple channels within the same Radio Access Technology (RAT). To address the two issues, we apply a change detection algorithm to discover time points where spectrum tenancy patterns vary, and propose to characterize spectrum usage in a multi-channel RAT by the Vector Autoregressive (VAR) model. Through analyzing LTE spectrum tenancy data with the algorithm and the model, we validate that the segment size discovered by the online change detection method coincides with the one obtained by brute force, and VAR outperforms the widely adopted on/off model. 
    more » « less
  4. Summary

    After making a lineup identification, eyewitnesses remember being more confident in their identification and having a better view of the initial crime if they are told they correctly identified the suspect compared to witnesses not given this feedback. The present studies investigated whether this effect of feedback occurs similarly when witnesses report their confidence numerically and when they report their confidence in their own words. Across three studies, participants (N = 1396) watched a mock crime video, received either confirmatory feedback or not, and reported their confidence in words, numbers, or both words and numbers. Results showed a significant effect of feedback on both confidence and witnessed experience in all confidence conditions. This effect occurred with both biased and unbiased lineup instructions and with both target‐present and target‐absent lineups. The results advance discussions about the best means for reporting confidence in the field.

     
    more » « less
  5. Cognitive radio (CR) technology is envisioned to use wireless spectrum opportunistically when the primary user (PU) is not using it. In cognitive radio ad-hoc networks (CRAHNs), the mobile users form a distributed multi-hop network using the unused spectrum. The qualities of the channels are different in different locations. When a user moves from one place to another, it needs to switch the channel to maintain the quality-of-service (QoS) required by different applications. The QoS of a channel depends on the amount of usage. A user can select the channels that meet the QoS requirement during its movement. In this paper, we study the mobility patterns of users, predict their next locations and probabilities to move there based on its history. We extract the mobility patterns from each user’s location history and match the recent trajectory with the patterns to find future locations. We construct a spectrum database using Wi-Fi access point location data and the free space path loss formula. We propose a machine learning-based mechanism to predict spectrum status of some missing locations in the spectrum database. We formulate a problem to select the current channel in order to minimize the total number of channel switches during a certain number of next moves of a user. We conduct an extensive simulation combining real and synthetic datasets to support our model. 
    more » « less