CatchIt: Detect Malicious Nodes in Collaborative Spectrum Sensing

Size: px
Start display at page:

Download "CatchIt: Detect Malicious Nodes in Collaborative Spectrum Sensing"

Transcription

1 CatchIt: Detect Malicious Nodes in Collaborative Spectrum Sensing Wenkai Wang, Husheng Li, Yan (Lindsay) Sun, and Zhu Han Department of Electrical, Computer and Biomedical Engineering University of Rhode Island, Kingston, RI 0288 Department of Electrical Engineering and Computer Science University of Tennessee, Knoxville, TN Department of Electrical and Computer Engineering University of Houston, Houston, TX Abstract Collaborative spectrum sensing in cognitive radio networks has been proposed as an efficient way to improve the performance of primary users detection. In collaborative spectrum sensing schemes, secondary users are often assumed to be trustworthy. In practice, however, cognitive radio nodes can be compromised. Compromised secondary users can report false detection results and significantly degrade the performance of spectrum sensing. In this paper, we investigate the case that there are multiple malicious users in cognitive radio networks and the exact number of malicious users is unknown. An onion-peeling approach is proposed to defense against multiple untrustworthy secondary nodes. We calculate suspicious level of all nodes according to their reports. When the suspicious level of a node is beyond certain threshold, it will be considered as malicious and its report will be excluded in decision-making. We continue to calculate the suspicious level of remaining nodes until no malicious node can be found. Simulation results show that malicious nodes greatly degrade the performance of collaborative sensing, and the proposed scheme can efficiently detect malicious nodes. Compared with existing defense methods, the proposed scheme significantly improves the performance of primary user detection, measured by ROC curves, and captures the dynamic change in the behaviors of malicious users. Keywords: Collaborative Spectrum Sensing, Security. I. INTRODUCTION The increasing spectrum demand for new wireless applications leads to the idea of cognitive radio []. It allows secondary users to communicate in licensed spectrum provided that they do not cause harmful interference to primary users. A major challenge in cognitive radio networks is to detect available spectrum resources in given time and location without changing the existing system framework of primary users. There are several detection schemes, including matched filter, energy detection, cyclostationary detection and wavelet detection [], [2]. Among them, energy detection is a common method for detection of unknown signals because it does not depend on the structure of primary signal [3], [4]. The performance of spectrum sensing degrades significantly when wireless channel experiences fading or shadowing. To deal with this problem, collaborative spectrum sensing which combines sensing results of multiple nodes is proposed to This work is supported by NSF Award # and # achieve better performance. Roughly speaking, there are two types of collaborative sensing techniques. In the first type, multiple secondary users send sensing reports directly to a common decision center [3] [8]. In the second type, some secondary users relay sensing reports for other secondary users and the decision can be made in a distributed manner [9], [0]. Most current collaborative sensing schemes assume that all secondary users are honest. However, the attacker can compromise or control some cognitive radio nodes, and the compromised secondary users can report dishonest sensing information and degrade sensing performance. There are very limited works that address the problem of malicious secondary users. A straightforward defense is proposed in [] for harddecision case, in which secondary users report yes (i.e. primary user presents) or no (i.e. primary user absents). When there are k malicious nodes, the decision center decides yes only if there are at least k + nodes reporting yes. This simple defense scheme has several disadvantages. First, it is hard to accurately estimate the number of malicious nodes (i.e. k value). Second, the smart attackers may not report yes all the time. This scheme, which is very conservative, can greatly scarify the performance of collaborative sensing. Third, this scheme cannot be directly applied to the scenario when the nodes report sensed energy instead of hard decisions. An attack called Spectrum Sensing Data Falsification (SSDF) was discussed in [2]. The scheme deals with dishonest users in distributed spectrum sensing. It requires the secondary users to collect more reports from neighbors when the current reports are not sufficient for making confirmative decision. In [3], the credibility of secondary users is taken into consideration in primary user detection. The credibility scores are based on each secondary user s detection rate and false alarm rate, but do not consider potential malicious cheating behaviors. A scheme proposed in [4] addresses the compromised cognitive nodes sending false information in centralized spectrum sensing. The proposed scheme can differentiate honest and malicious nodes when there is only one malicious node. However, the scheme cannot be applied to multiple malicious users scenario. In this paper, we propose an onion-peeling approach to defend against multiple malicious nodes. We calculate suspicious level of all secondary users according to their reports.

2 2 Fig.. Secondary user Secondary user Primary user Decision Center Task : Malicious secondary user? Task 2: Primary user existing? Collaborative Spectrum Sensing Secondary user When the suspicious level of a node is beyond certain threshold, it will be regarded as malicious and its report will be excluded in decision-making. Then we continue to calculate the suspicious level of remaining nodes until no malicious nodes can be found. We compare the performance of the collaborative sensing scheme without security protection, the scheme using a straightforward existing defense method [], and the proposed scheme under various scenarios. Simulation results demonstrate that multiple attackers can significantly degrade the performance of collaborative sensing when there is no defense. The straightforward defense scheme alleviates the problem but still has high false alarm rate. The proposed scheme can efficiently detect malicious users and improve the sensing performance. For example, when there are 0 secondary users, with the primary user detection rate being, two malicious users can make the false alarm rate (P f ) increase to 85%, the straightforward defense method can reduce P f to 23%, while proposed scheme can decrease P f to 8%. Furthermore, when a good user suddenly turns bad, the proposed scheme can quickly increase the suspicious level of this user. If this user only behaves badly for a few times, its suspicious level can recover after a large number of good behaviors. As a summary, the proposed scheme has two major advantages. First, it is self-adaptive and does not need to know the number of attackers beforehand. Second, it has better performance compared to the existing defense scheme that even has the knowledge of maximum number of attackers. The performance is measured by the ROC (Receiver Operating Characteristic) curve of primary user detection. This paper is organized as follows. System model is given in Section II. In Section III, the attack models and the proposed scheme are explained. Simulation results are shown in Section IV and conclusion is drawn in Section V. II. SYSTEM MODEL In this section, we briefly describe the scenario of collaborative spectrum sensing and then propose two attack models. A. Collaborative Spectrum Sensing The objective of spectrum sensing is to detect whether the primary user is transmitting or not, based on the reports from the secondary users. Let H 0 stand for the absence of primary user and H for the presence of primary user. The goal is to decide the hypotheses test: { ni, H y i 0, () h i s + n i, H, where y i is the received signal at the i-th secondary user, n i is the thermal noise, h i is the channel gain from the primary transmitter to the i-th secondary user, and s is the transmitted symbol from the primary user. Suppose Y i is the sensed energy for the i-th cognitive user in T time slots, the distribution of Y i is χ 2 distribution as: { χ 2 Y i 2T W, H 0, χ 2 2T W (2γ (2) i), H, where γ i is the received signal to noise ratio, and T W is time-bandwidth product. From (2) it can be seen that under H 0, given T W and y i, the probability P (Y i y i H 0 ) is known when the channel statistics are known. Similarly, under H, given T W and y i, the probability P (Y i y i H ) is also known. Both the conditional probability can be calculated based on path loss model and the location information. However, results in [3], [4] show that the performance of spectrum sensing degrades significantly when channel experiences fading or shadowing. In this case, collaborative sensing which combines detection results from several secondary users is proposed to achieve better performance. This scenario, called collaborative spectrum sensing, is shown in Figure. Here, N collaborative secondary users send reports to the decision center and then decision center makes the final decision. B. Attack Model When a secondary user is malicious, it can cause false alarm by reporting yes or high energy level when the primary user absents. This is the major security concern. In addition, the attacker can increase the miss detection rate if it reports no or low energy level when the primary user presents. To demonstrate the performance of the proposed defense scheme, in this paper, we adopt the two attack models, FA and FAMD, presented in [4]. The attacks are modeled by three parameters: the attack threshold (η), attack strength ( ), and attack probability (P a ) For a continuous spectrum sensing process, let X n (t) denote the observation of node n about the existence of the primary user at time slot t. The two attack models are, False Alarm (FA) Attack: In each time slot, if the sensed energy X n (t) is higher than η, the attacker reports X n (t); otherwise, it will attack with probability P a. This means it does not necessarily attack all the time. It can randomly choose to attack or not in one round, with probability P a. If it chooses to attack, it will report X n (t) +. False Alarm & Miss Detection (FAMD) Attack: In each time slot, attacker chooses to attack or not with attack probability P a. If it doesn t attack, it will just report what it has. Otherwise, it will compare the sensed energy X n (t) with η. If it is higher than η, the attacker reports X n (t) ; otherwise, it reports X n (t) +.

3 3 With the FA attack, the malicious secondary user aims to cause high false alarm. While in the FAMD attack, the malicious user can cause both false alarm and miss detection. For the defense scheme proposed in this paper, we assume that the attack type, either FA or FAMD, is known. III. SECURE COLLABORATIVE SENSING To defend collaborative spectrum sensing against dishonest secondary users, we first consider an ideal malicious node detection scheme. The scheme enumerates all possible malicious nodes set and tries to identify the set with the largest possibility of being malicious. However, this method faces the curse of dimensionality. Then, a heuristic scheme called Onion-peeling approach is proposed. A. Ideal Malicious Node Detection We use S(t) to denote channel state which is either B (Busy) or I (Idle) for each sensing time slot. Channel states in different time slots are assumed to be independent of each other. Let q B (t) and q I (t) denote the a priori probabilities of states B and I for time slot t, respectively. Recall that X j (t) is the observation of node j at time slot t. Let p B and p I denote the observation probabilities of X j (t) under busy and idle states, respectively, i.e. p I (X j (t)) P (X j (t) S(t) I), (3) p B (X j (t)) P (X j (t) S(t) B). (4) Let T n be the type of node n, which could be H (honest) or M (Malicious), and F t be all observations from time slot to time slot t. For any Ω {,..., N} (note that Ω could be an empty set, i.e. there is no attacker), we define π Ω (t) P (T n M, n Ω, T m H, m / Ω F t ), (5) as the belief that all nodes in Ω are malicious nodes while all other nodes are honest. Given any particular set of malicious nodes Θ, by applying Bayesian criterion, we have π Ω (t) P (F t Ω)P (Ω) Θ P (F t Θ)P (Θ). (6) Suppose that P (T n M) ρ for all nodes. Then, we have P (Ω) ρ Ω ( ρ) N Ω, (7) where Ω is the cardinality of Ω. Next, we can calculate where P (F t Ω) τ P (X j (τ) F, F τ ) P (X j (τ) T j H) j / Ω j Ω ρ n (τ), (8) τ ρ n (t) j / Ω P (X j (τ) T j H) j Ω P (X j (τ) F, F τ ). (9) For each possible choice of Ω, using equation (6)-(9), we can calculate the probability that this Ω contains all malicious users but no honest users. Choose the Ω(t) with largest π Ω (t) value. Then we can define a threshold, when π Ω (t) of the chosen Ω(t) is beyond this threshold, the nodes in Ω are considered to be malicious. However, for a cognitive radio network with N secondary users, there are 2 N different choices of set Ω. Thus, the complexity grows exponentially with N. So this ideal detection of attackers faces the curse of dimensionality. When N is large, we have to use approximate and heuristic approach. B. Onion-Peeling Approach In this paper, we propose a heuristic onion-peeling approach that detects the malicious user set in a batch-by-batch way. Let suspicious level describe the possibility that a node is malicious. We calculate suspicious level of all users according to their reports. When the suspicious level of a node is beyond certain threshold, it will be considered as malicious and its report will be excluded in primary user detection in this round. Then we continue to calculate the suspicious level of remaining nodes until no malicious node can be found. First we initialize the set of malicious nodes, Ω, as an empty set. In the first stage, compute the a posteriori probability of attacker for any node n, which is given by π n (t) P (T n M F t ) P (F t T n M)P (T n M) P (F t T n M)P (T n M) + P (F t T n H)P (T n H) (0) where we assume that all other nodes are honest when computing P (F t T n M) and P (F t T n H). Note here we only calculate the suspicious level for each node rather than that of a malicious nodes set, the computation complexity is reduced from O(2 N ) to O(N). Let X(t) denote the collection of X n (t), i.e. reports from all secondary users at time slot t. It is easy to verify where P (F t T n M) P (X(τ) T n M, F τ ) τ τ j,j n P (X j (τ) T j H) P (X n (τ) F τ ) ρ n (τ), () τ ρ n (t) P (X n (t) F τ ) j,j n P (X j (t) T j H), (2) Here, P (F t T n M) means the probability of reports at time slot t conditioned that node n is malicious. Note that the first equation is obtained by repeatedly applying the following equation P (F t T n M) P (X(t) T n M, F t )P (F t T n M). (3)

4 4 Similarly, where φ n (t) P (F t T n H) P (X(τ) T n H, F τ ) τ P (X j (τ) T j H) τ j φ n (τ), (4) τ P (X j (t) T j H). (5) j As mentioned before, q B (t) and q I (t) are the priori probabilities of whether the primary user exists or not, p B (X j (t)) and p I (X j (t)) are the observation probabilities of X j (t) under busy and idle states. An honest user s report probability can be calculated by P (X j (t) T j H) p B (X j (t))q B (t) + p I (X j (t))q I (t). (6) Then for each reporting round, we can update each node s suspicious level based on above equations. We set a threshold ξ and consider n as a malicious node when n is the first node such that P (T n M F t ) ξ. (7) Then, add n into Ω. Through equation (0) - (7), we have shown how to detect the first malicious node. In the k-th stage, we compute the a posteriori probability of attacker in the same manner of (0). The only difference is that when computing P (F t T n M) and P (F t T n H), we assume that all nodes in Ω are malicious. Equation (2) and (5) now become (8) and (9) respectively, and they can be seen as the special cases of (8) and (9) when Ω is empty. ρ n (t) P (X n (t) F τ ) ( N j,j n,j Ω φ n (t) ( N j,j n,j / Ω P (X j (t) T j H). P (X j (t) T j M) ), (8) j,j / Ω j,j Ω P (X j (t) T j H). P (X j (t) T j M) ), (9) Add n k to Ω when n k is the first node (not in Ω) such that P (T nk M F t ) ξ. (20) Repeat the procedure until no new malicious node can be found. Based on the above discussion, the primary user detection process is shown in Procedure. The basic idea is to eliminate the reports from users who have suspicious level higher than threshold before making final decision. In this procedure, ξ can be chosen dynamically. This procedure can be used together with many existing primary user detection algorithms, for example, hard decision combing or soft decision combing. The study in [] have shown that hard decision performs almost the same as soft decision in terms of achieving performance gain when the cooperative users (0-20) face independent fading. For simplicity, in this paper, we will use the hard decision combining algorithm in [3], [4] to demonstrate the performance of the proposed scheme and other defense schemes. Procedure Primary user detection : initialize the set of malicious nodes. 2: collect reports from N secondary users. 3: calculate suspicious level for all users. 4: for each user n do 5: if π n(t) > ξ then 6: move node n to malicious nodes set, the report from user n is removed 7: exit loop 8: end if 9: end for 0: perform primary user detection algorithm based nodes that are currently assumed to be honest. : go to step 2 and repeat the procedure IV. SIMULATION RESULTS We simulate a cognitive radio network with N( 0) secondary users. Distance from the N cognitive radios to primary transmitter is randomly distributed from 000m to 2000m. The time-bandwidth product [3], [4] is m 5. Primary transmission power and noise level is set to 200mw and -0dBm respectively. We use the two-state Markov chain channel model described in [5] as shown by Figure 2. The transition probabilities, P BI (from busy to idle) and P IB (from idle to busy) are both set to 0.. The path loss exponent is 3 and Rayleigh fading is assumed. Channel gains are updated based on node s location for each sensing report. The attack threshold is η 5, the attack strength is 5, and the attack probability P a is 00%. The suspicious level threshold ξ is set to. Three schemes of primary user detection are compared. OR Rule: When one or more secondary users reported value is greater than certain threshold, the primary user is Fig. 2. Two-state Markov chain channel model

5 5 No Attacker,N0,OR No Attacker,N0,OR No Attacker,N8,OR No Attacker,N8,OR Two Attackers,N0,OR Two Attackers,N0,K3 Two Attackers,N0,OR Two Attackers,N0,K3 Proposed Scheme,t500 Proposed Scheme,t500 Proposed Scheme,t Proposed Scheme,t Fig. 3. ROC curves (False Alarm Attack, Two Attackers) Fig. 5. ROC curves (False Alarm & Miss Detection Attack, Two Attackers) No Attacker,N0,OR No Attacker,N7,OR Three Attackers,N0,OR Three Attackers,N0,K4 No Attacker,N0,OR No Attacker,N7,OR Three Attackers,N0,OR Three Attackers,N0,K4 Proposed Scheme,t500 Proposed Scheme,t500 Proposed Scheme,t Proposed Scheme,t Fig. 4. ROC curves (False Alarm Attack, Three Attackers) Fig. 6. ROC curves (False Alarm & Miss Detection Attack, Three Attackers) considered to be present. This is the most common hard fusion method. Ki Rule: When i or more secondary users reported values are greater than certain threshold, the primary user is considered to be present. This is the straightforward defense scheme proposed in []. Proposed Scheme: Use OR rule after removing reports of malicious nodes. As shown in Figure 3-6, the ROC curves for six cases are generated. Case is N honest users, no malicious node, and OR rule. Case 2 is N 2 (or N 3) honest users, no attacker, and OR rule. Case 3-6 is N 2 (or N 3) honest users and 2 (or 3) malicious users. OR rule is used in case 3 and Ki rule is used in case 4. Case 5 and case 6 are with the proposed scheme with different detection rounds. Case 5 is the performance evaluated at round t 500 and case 6 is at round t 000. When the attack strategy is the FA Attack, Figure 3 and Figure 4 show the ROC curves when the attacker number is 2 and 3, respectively. The following observations are made. By comparing the ROC curves for case and case 3, we see that the performance of primary user detection degrades significantly when there are multiple malicious users. When detection rate is 99%, corresponding false alarm rate is higher than 80%, which implies inefficient usage of available spectrum resource. The proposed scheme demonstrates significant perfor- mance gain over the scheme without defense (i.e. OR rule) and the straightforward defense scheme (i.e. Ki rule). Table shows the false alarm rate (P f ) when detection rate is P d 99%. Table False Alarm Rate (when detection rate ) OR Ki Proposed Proposed Rule Rule (t 500) (t 000) FA,2 Attackers FA,3 Attackers FAMD,2 Attackers FAMD,3 Attackers When there are three attackers, false alarm rate for all these schemes are larger, but the performance advantage of proposed scheme over other schemes is still large. In addition, as t increases, the performance of the proposed scheme becomes close to the performance of case 2, which is the performance upper bound. Figure 5 and Figure 6 shows the ROC performance when the schemes face the FAMD attack. We observe that the FAMD attack is stronger than FA. Compared to the cases with FA attack, performance of the OR rule and Ki rule is worse when facing the FAMD attack. However, the performance of the proposed scheme is almost the same under both attacks. That is, the proposed scheme is highly effective under both attacks, and much better than the traditional OR rule and the simple defense Ki rule. The examples of false alarm rate are listed in Table.

6 Malicious Node Malicious Node 2 Honest Node Suspicious Level Suspicious Level Malicious Node Malicious Node 2 Honest Node Detection Round Detection Round Fig. 7. Dynamic suspicious level in proposed scheme (two malicious nodes perform FA attack during time [20, 00].) Fig. 8. Dynamic suspicious level in proposed scheme (two malicious nodes perform FA attack during time [5, 5].) Finally, dynamic suspicious level of honest users and malicious users are shown in Figure 7 and 8. Please note that we only demonstrate suspicious level curve for one honest node. The malicious user adopts the FA attack and dynamically chooses which round to start attack and which round to stop attack. In Figure 7, the malicious users start to attack at t 20 and stop to attack at time t 00. We can see that the suspicious level of malicious nodes increases steadily when nodes turn from good to bad. In Figure 8, one user behaves badly in only 0 rounds starting at t 5. In this case, its suspicious level increases rapidly, stay high for a number of rounds and then drop to normal. This means that the proposed scheme allows slow recovery of suspicious level after occasional bad behaviors, which may due to channel variation and unintentional errors. Figure 7 and 8 also demonstrate the convergence speed of the proposed algorithm. In this set of experiments, it takes about 30 rounds to converge. Convergence means that the suspicious levels of malicious nodes and the suspicious levels of honest nodes are largely separated. V. CONCLUSIONS Multiple malicious nodes will significantly degrade performance of collaborative sensing. In this paper, we propose an onion-peeling defense scheme. It first computes suspicious level of nodes according to reports, and then removes malicious nodes one by one based on their suspicious level until all remaining nodes are honest. Comprehensive simulations are conducted to study the ROC curves and suspicious level dynamics for different attack models, attacker numbers and different collaborative sensing schemes. The proposed schemes demonstrate significant performance advantage. For example, when there are 0 secondary users, with the primary user detection rate equals to, two malicious users can make the false alarm rate (P f ) increases to 85%. While the simple defense scheme can reduce P f to 23%, the proposed scheme reduces P f to 8%. Furthermore, when a good user suddenly turns bad, the proposed scheme can quickly increase the suspicious level of this user. If this user only behaves badly for a few times, its suspicious level can recover after a large number of good behaviors. The onion-peeling approach used in this paper is novel and demonstrates effectively differentiation of malicious nodes and honest nodes. REFERENCES [] S. Haykin, Cognitive radio: brain-empowered wireless communications, IEEE J. Select. Areas in Commun., vol. 23, no. 2, Page(s): , Feb [2] E. Hossain, D. Niyato, and Z. Han, Dynamic Spectrum Access in Cognitive Radio Networks, in print, Cambridge University Press, UK, [3] A. Ghasemi and E. S. Sousa, Collaborative spectrum sensing for opportunistic access in fading environments, in Proc. of First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, DySPAN, Nov [4] A. Ghasemi and E. S. Sousa, Opportunistic spectrum access in fading channels through collaborative sensing, Journal of Communications (JCM), vol. 2, no. 2, pp. 7-82, Mar [5] H. Sarvanko, M. Mustonen, A. Hekkala, A. Mammela, M. Matinmikko, M. Katz, Cooperative and noncooperative spectrum sensing techniques using Welchs periodogram in cognitive radios, in Proc. of IEEE First International Workshop on Cognitive Radio and Advanced Spectrum Management, CogART 08, Feb [6] K. B. Letaief and W. Zhang, Cooperative spectrum sensing, Cognitive Wireless Communication Networks, Springer, [7] C. Sun, W. Zhang, and K. B. Letaief, Cluster-based cooperative spectrum sensing in cognitive radio systems, in Proc. of IEEE International Conference on Communications, Glasgow, Scottland, Jun [8] C. H. Lee and W. Wolf, Energy efficient techniques for cooperative spectrum sensing in cognitive radios, in Proc. of IEEE Consumer Communications and Networking Conference, Jan [9] G. Ghurumuruhan and Y. (G.) Li, Cooperative spectrum sensing in cognitive radio: Part I: two user networks, IEEE Trans. on Wireless Commun., vol.6, no.6, p.p , Jun [0] G. Ghurumuruhan and Y. (G.) Li, Cooperative spectrum sensing in cognitive radio: Part II: multiuser networks, IEEE Transactions on Wireless Communications, vol.6, no.6, p.p , Jun [] S. M. Mishra, A. Sahai, and R. W. Broderson, Cooperative sensing among Cognitive Radios, in Proc. of IEEE International Conference on Communications(ICC), Jun [2] R. Chen, J. M. Park, and K. Bian, Robust distributed spectrum sensing in cognitive radio networks, in Proc. of IEEE Infocom 2008 miniconference, Apr [3] W. Yang, Y. Cai, Y. Xu, A fuzzy collaborative spectrum sensing scheme in cognitive radio, in Proc. of International Symposium on Intelligent Signal Processing and Communication Systems, ISPACS 07, Nov [4] W. Wang, H. Li, Y. Sun, and Z. Han, Attack-proof collaborative spectrum sensing in cognitive radio networks, 43rd Annual Conference on Information Sciences and Systems, Mar [5] Q. Zhao, L. Tong, A. Swami, and Y. Chen, Decentralized Cognitive MAC for Opportunistic Spectrum Access in Ad Hoc Networks: A POMDP Framework, IEEE J. Select. Areas Commun. (JSAC): Special Issue on Adaptive, Spectrum Agile and Cognitive Wireles Networks, vol. 25, no. 3, pp , Apr

Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks

Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks Wenkai Wang, Husheng Li, Yan (Lindsay) Sun, and Zhu Han Department of Electrical, Computer and Biomedical Engineering University

More information

Effect of Time Bandwidth Product on Cooperative Communication

Effect of Time Bandwidth Product on Cooperative Communication Surendra Kumar Singh & Rekha Gupta Department of Electronics and communication Engineering, MITS Gwalior E-mail : surendra886@gmail.com, rekha652003@yahoo.com Abstract Cognitive radios are proposed to

More information

PERFORMANCE MEASUREMENT OF ONE-BIT HARD DECISION FUSION SCHEME FOR COOPERATIVE SPECTRUM SENSING IN CR

PERFORMANCE MEASUREMENT OF ONE-BIT HARD DECISION FUSION SCHEME FOR COOPERATIVE SPECTRUM SENSING IN CR Int. Rev. Appl. Sci. Eng. 8 (2017) 1, 9 16 DOI: 10.1556/1848.2017.8.1.3 PERFORMANCE MEASUREMENT OF ONE-BIT HARD DECISION FUSION SCHEME FOR COOPERATIVE SPECTRUM SENSING IN CR M. AL-RAWI University of Ibb,

More information

Review of Energy Detection for Spectrum Sensing in Various Channels and its Performance for Cognitive Radio Applications

Review of Energy Detection for Spectrum Sensing in Various Channels and its Performance for Cognitive Radio Applications American Journal of Engineering and Applied Sciences, 2012, 5 (2), 151-156 ISSN: 1941-7020 2014 Babu and Suganthi, This open access article is distributed under a Creative Commons Attribution (CC-BY) 3.0

More information

Dynamic Spectrum Access in Cognitive Radio Networks. Xiaoying Gan 09/17/2009

Dynamic Spectrum Access in Cognitive Radio Networks. Xiaoying Gan 09/17/2009 Dynamic Spectrum Access in Cognitive Radio Networks Xiaoying Gan xgan@ucsd.edu 09/17/2009 Outline Introduction Cognitive Radio Framework MAC sensing Spectrum Occupancy Model Sensing policy Access policy

More information

Decentralized Cognitive MAC for Opportunistic Spectrum Access in Ad-Hoc Networks: A POMDP Framework

Decentralized Cognitive MAC for Opportunistic Spectrum Access in Ad-Hoc Networks: A POMDP Framework Decentralized Cognitive MAC for Opportunistic Spectrum Access in Ad-Hoc Networks: A POMDP Framework Qing Zhao, Lang Tong, Anathram Swami, and Yunxia Chen EE360 Presentation: Kun Yi Stanford University

More information

Cooperative Spectrum Sensing in Cognitive Radio

Cooperative Spectrum Sensing in Cognitive Radio Cooperative Spectrum Sensing in Cognitive Radio Project of the Course : Software Defined Radio Isfahan University of Technology Spring 2010 Paria Rezaeinia Zahra Ashouri 1/54 OUTLINE Introduction Cognitive

More information

SIMULATION OF COOPERATIVE SPECTRUM SENSING TECHNIQUES IN COGNITIVE RADIO USING MATLAB

SIMULATION OF COOPERATIVE SPECTRUM SENSING TECHNIQUES IN COGNITIVE RADIO USING MATLAB SIMULATION OF COOPERATIVE SPECTRUM SENSING TECHNIQUES IN COGNITIVE RADIO USING MATLAB 1 ARPIT GARG, 2 KAJAL SINGHAL, 3 MR. ARVIND KUMAR, 4 S.K. DUBEY 1,2 UG Student of Department of ECE, AIMT, GREATER

More information

Sequential Multi-Channel Access Game in Distributed Cognitive Radio Networks

Sequential Multi-Channel Access Game in Distributed Cognitive Radio Networks Sequential Multi-Channel Access Game in Distributed Cognitive Radio Networks Chunxiao Jiang, Yan Chen, and K. J. Ray Liu Department of Electrical and Computer Engineering, University of Maryland, College

More information

Fuzzy Logic Based Smart User Selection for Spectrum Sensing under Spatially Correlated Shadowing

Fuzzy Logic Based Smart User Selection for Spectrum Sensing under Spatially Correlated Shadowing Open Access Journal Journal of Sustainable Research in Engineering Vol. 3 (2) 2016, 47-52 Journal homepage: http://sri.jkuat.ac.ke/ojs/index.php/sri Fuzzy Logic Based Smart User Selection for Spectrum

More information

Effects of Malicious Users on the Energy Efficiency of Cognitive Radio Networks

Effects of Malicious Users on the Energy Efficiency of Cognitive Radio Networks Effects of Malicious Users on the Energy Efficiency of Cognitive Radio Networks Efe F. Orumwense 1, Thomas J. Afullo 2, Viranjay M. Srivastava 3 School of Electrical, Electronic and Computer Engineering,

More information

A Secure Transmission of Cognitive Radio Networks through Markov Chain Model

A Secure Transmission of Cognitive Radio Networks through Markov Chain Model A Secure Transmission of Cognitive Radio Networks through Markov Chain Model Mrs. R. Dayana, J.S. Arjun regional area network (WRAN), which will operate on unused television channels. Assistant Professor,

More information

Implementation of Cognitive Radio Networks Based on Cooperative Spectrum Sensing Optimization

Implementation of Cognitive Radio Networks Based on Cooperative Spectrum Sensing Optimization www.semargroups.org, www.ijsetr.com ISSN 2319-8885 Vol.02,Issue.11, September-2013, Pages:1085-1091 Implementation of Cognitive Radio Networks Based on Cooperative Spectrum Sensing Optimization D.TARJAN

More information

Adaptive Scheduling of Collaborative Sensing in Cognitive Radio Networks

Adaptive Scheduling of Collaborative Sensing in Cognitive Radio Networks APSIPA ASC Xi an Adaptive Scheduling of Collaborative Sensing in Cognitive Radio Networks Zhiqiang Wang, Tao Jiang and Daiming Qu Huazhong University of Science and Technology, Wuhan E-mail: Tao.Jiang@ieee.org,

More information

Spectrum Sensing for Wireless Communication Networks

Spectrum Sensing for Wireless Communication Networks Spectrum Sensing for Wireless Communication Networks Inderdeep Kaur Aulakh, UIET, PU, Chandigarh ikaulakh@yahoo.com Abstract: Spectrum sensing techniques are envisaged to solve the problems in wireless

More information

Channel Sensing Order in Multi-user Cognitive Radio Networks

Channel Sensing Order in Multi-user Cognitive Radio Networks 2012 IEEE International Symposium on Dynamic Spectrum Access Networks Channel Sensing Order in Multi-user Cognitive Radio Networks Jie Zhao and Xin Wang Department of Electrical and Computer Engineering

More information

Cognitive Relaying and Opportunistic Spectrum Sensing in Unlicensed Multiple Access Channels

Cognitive Relaying and Opportunistic Spectrum Sensing in Unlicensed Multiple Access Channels Cognitive Relaying and Opportunistic Spectrum Sensing in Unlicensed Multiple Access Channels Jonathan Gambini 1, Osvaldo Simeone 2 and Umberto Spagnolini 1 1 DEI, Politecnico di Milano, Milan, I-20133

More information

IMPROVED PROBABILITY OF DETECTION AT LOW SNR IN COGNITIVE RADIOS

IMPROVED PROBABILITY OF DETECTION AT LOW SNR IN COGNITIVE RADIOS 87 IMPROVED PROBABILITY OF DETECTION AT LOW SNR IN COGNITIVE RADIOS Parvinder Kumar 1, (parvinderkr123@gmail.com)dr. Rakesh Joon 2 (rakeshjoon11@gmail.com)and Dr. Rajender Kumar 3 (rkumar.kkr@gmail.com)

More information

Nagina Zarin, Imran Khan and Sadaqat Jan

Nagina Zarin, Imran Khan and Sadaqat Jan Relay Based Cooperative Spectrum Sensing in Cognitive Radio Networks over Nakagami Fading Channels Nagina Zarin, Imran Khan and Sadaqat Jan University of Engineering and Technology, Mardan Campus, Khyber

More information

Cooperative Spectrum Sensing and Spectrum Sharing in Cognitive Radio: A Review

Cooperative Spectrum Sensing and Spectrum Sharing in Cognitive Radio: A Review International Journal of Computer Applications in Engineering Sciences [VOL I, ISSUE III, SEPTEMBER 2011] [ISSN: 2231-4946] Cooperative Spectrum Sensing and Spectrum Sharing in Cognitive Radio: A Review

More information

Biologically Inspired Consensus-Based Spectrum Sensing in Mobile Ad Hoc Networks with Cognitive Radios

Biologically Inspired Consensus-Based Spectrum Sensing in Mobile Ad Hoc Networks with Cognitive Radios Biologically Inspired Consensus-Based Spectrum Sensing in Mobile Ad Hoc Networks with Cognitive Radios F. Richard Yu and Minyi Huang, Carleton University Helen Tang, Defense R&D Canada Abstract Cognitive

More information

COGNITIVE Radio (CR) [1] has been widely studied. Tradeoff between Spoofing and Jamming a Cognitive Radio

COGNITIVE Radio (CR) [1] has been widely studied. Tradeoff between Spoofing and Jamming a Cognitive Radio Tradeoff between Spoofing and Jamming a Cognitive Radio Qihang Peng, Pamela C. Cosman, and Laurence B. Milstein School of Comm. and Info. Engineering, University of Electronic Science and Technology of

More information

Stability Analysis for Network Coded Multicast Cell with Opportunistic Relay

Stability Analysis for Network Coded Multicast Cell with Opportunistic Relay This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 00 proceedings Stability Analysis for Network Coded Multicast

More information

Cooperative Spectrum Sensing and Decision Making Rules for Cognitive Radio

Cooperative Spectrum Sensing and Decision Making Rules for Cognitive Radio ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference

More information

Performance Analysis of Cognitive Radio based on Cooperative Spectrum Sensing

Performance Analysis of Cognitive Radio based on Cooperative Spectrum Sensing Performance Analysis of Cognitive Radio based on Cooperative Spectrum Sensing Sai kiran pudi 1, T. Syama Sundara 2, Dr. Nimmagadda Padmaja 3 Department of Electronics and Communication Engineering, Sree

More information

Data Fusion Schemes for Cooperative Spectrum Sensing in Cognitive Radio Networks

Data Fusion Schemes for Cooperative Spectrum Sensing in Cognitive Radio Networks Data Fusion Schemes for Cooperative Spectrum Sensing in Cognitive Radio Networs D.Teguig ((2, B.Scheers (, and V.Le Nir ( Royal Military Academy Department CISS ( Polytechnic Military School-Algiers-Algeria

More information

FULL-DUPLEX COGNITIVE RADIO: ENHANCING SPECTRUM USAGE MODEL

FULL-DUPLEX COGNITIVE RADIO: ENHANCING SPECTRUM USAGE MODEL FULL-DUPLEX COGNITIVE RADIO: ENHANCING SPECTRUM USAGE MODEL Abhinav Lall 1, O. P. Singh 2, Ashish Dixit 3 1,2,3 Department of Electronics and Communication Engineering, ASET. Amity University Lucknow Campus.(India)

More information

Performance Analysis of Cooperative Spectrum Sensing in CR under Rayleigh and Rician Fading Channel

Performance Analysis of Cooperative Spectrum Sensing in CR under Rayleigh and Rician Fading Channel Performance Analysis of Cooperative Spectrum Sensing in CR under Rayleigh and Rician Fading Channel Yamini Verma, Yashwant Dhiwar 2 and Sandeep Mishra 3 Assistant Professor, (ETC Department), PCEM, Bhilai-3,

More information

Robust Collaborative Spectrum Sensing Schemes in Cognitive Radio Networks

Robust Collaborative Spectrum Sensing Schemes in Cognitive Radio Networks Robust Collaborative Spectrum Sensing Schemes in Cognitive Radio Networks Hongjuan Li 1,2, Xiuzhen Cheng 1, Keqiu Li 2, Chunqiang Hu 1, and Nan Zhang 1 1 Department of Computer Science, The George Washington

More information

Creation of Wireless Network using CRN

Creation of Wireless Network using CRN Creation of 802.11 Wireless Network using CRN S. Elakkiya 1, P. Aruna 2 1,2 Department of Software Engineering, Periyar Maniammai University Abstract: A network is a collection of wireless node hosts forming

More information

Internet of Things Cognitive Radio Technologies

Internet of Things Cognitive Radio Technologies Internet of Things Cognitive Radio Technologies Torino, 29 aprile 2010 Roberto GARELLO, Politecnico di Torino, Italy Speaker: Roberto GARELLO, Ph.D. Associate Professor in Communication Engineering Dipartimento

More information

Cooperative Sensing in Cognitive Radio Networks-Avoid Non-Perfect Reporting Channel

Cooperative Sensing in Cognitive Radio Networks-Avoid Non-Perfect Reporting Channel American J. of Engineering Applied Sciences (): 47-475, 9 ISS 94-7 9 Science ublications Cooperative Sensing in Cognitive Radio etworks-avoid on-erfect Reporting Channel Rania A. Mokhtar, Sabira Khatun,

More information

/13/$ IEEE

/13/$ IEEE A Game-Theoretical Anti-Jamming Scheme for Cognitive Radio Networks Changlong Chen and Min Song, University of Toledo ChunSheng Xin, Old Dominion University Jonathan Backens, Old Dominion University Abstract

More information

Co-Operative Spectrum Sensing In Cognitive Radio Network in ISM Band

Co-Operative Spectrum Sensing In Cognitive Radio Network in ISM Band Co-Operative Spectrum Sensing In Cognitive Radio Network in ISM Band 1 D.Muthukumaran, 2 S.Omkumar 1 Research Scholar, 2 Associate Professor, ECE Department, SCSVMV University, Kanchipuram ABSTRACT One

More information

Learning and Decision Making with Negative Externality for Opportunistic Spectrum Access

Learning and Decision Making with Negative Externality for Opportunistic Spectrum Access Globecom - Cognitive Radio and Networks Symposium Learning and Decision Making with Negative Externality for Opportunistic Spectrum Access Biling Zhang,, Yan Chen, Chih-Yu Wang, 3, and K. J. Ray Liu Department

More information

SPECTRUM SHARING IN CRN USING ARP PROTOCOL- ANALYSIS OF HIGH DATA RATE

SPECTRUM SHARING IN CRN USING ARP PROTOCOL- ANALYSIS OF HIGH DATA RATE Int. J. Chem. Sci.: 14(S3), 2016, 794-800 ISSN 0972-768X www.sadgurupublications.com SPECTRUM SHARING IN CRN USING ARP PROTOCOL- ANALYSIS OF HIGH DATA RATE ADITYA SAI *, ARSHEYA AFRAN and PRIYANKA Information

More information

Channel Sensing Order in Multi-user Cognitive Radio Networks

Channel Sensing Order in Multi-user Cognitive Radio Networks Channel Sensing Order in Multi-user Cognitive Radio Networks Jie Zhao and Xin Wang Department of Electrical and Computer Engineering State University of New York at Stony Brook Stony Brook, New York 11794

More information

Spectrum Sensing Using OFDM Signal and Cyclostationary Detection Technique In Cognitive Radio

Spectrum Sensing Using OFDM Signal and Cyclostationary Detection Technique In Cognitive Radio ISSN: 2319-7463, Vol. 5 Issue 4, Aril-216 Spectrum Sensing Using OFDM Signal and Cyclostationary Detection Technique In Cognitive Radio Mudasir Ah Wani 1, Gagandeep Singh 2 1 M.Tech Student, Department

More information

Toward Secure Distributed Spectrum Sensing in Cognitive Radio Networks

Toward Secure Distributed Spectrum Sensing in Cognitive Radio Networks Abstract Toward Secure Distributed Spectrum Sensing in Cognitive Radio Networks Ruiliang Chen, Jung-Min Park, Y. Thomas Hou, and Jeffrey H. Reed Wireless @ Virginia Tech Bradley Department of Electrical

More information

Soft Combination and Detection for Cooperative Spectrum Sensing in Cognitive Radio Networks

Soft Combination and Detection for Cooperative Spectrum Sensing in Cognitive Radio Networks 452 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 7, NO., NOVEMBER 28 Soft Combination and Detection for Cooperative Spectrum Sensing in Cognitive Radio Networks Jun Ma, Student Member, IEEE, Guodong

More information

Low Overhead Spectrum Allocation and Secondary Access in Cognitive Radio Networks

Low Overhead Spectrum Allocation and Secondary Access in Cognitive Radio Networks Low Overhead Spectrum Allocation and Secondary Access in Cognitive Radio Networks Yee Ming Chen Department of Industrial Engineering and Management Yuan Ze University, Taoyuan Taiwan, Republic of China

More information

Reputation Aware Collaborative Spectrum Sensing for Mobile Cognitive Radio Networks

Reputation Aware Collaborative Spectrum Sensing for Mobile Cognitive Radio Networks Reputation Aware Collaborative Spectrum Sensing for Mobile Cognitive Radio Networks Muhammad Faisal Amjad, Baber Aslam, Cliff C. Zou Department of Electrical Engineering and Computer Science, University

More information

WAVELET AND S-TRANSFORM BASED SPECTRUM SENSING IN COGNITIVE RADIO

WAVELET AND S-TRANSFORM BASED SPECTRUM SENSING IN COGNITIVE RADIO WAVELET AND S-TRANSFORM BASED SPECTRUM SENSING IN COGNITIVE RADIO S.Raghave #1, R.Saravanan *2, R.Muthaiah #3 School of Computing, SASTRA University, Thanjavur-613402, India #1 raga.vanaj@gmail.com *2

More information

Performance Evaluation of Energy Detector for Cognitive Radio Network

Performance Evaluation of Energy Detector for Cognitive Radio Network IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 8, Issue 5 (Nov. - Dec. 2013), PP 46-51 Performance Evaluation of Energy Detector for Cognitive

More information

Analysis of cognitive radio networks with imperfect sensing

Analysis of cognitive radio networks with imperfect sensing Analysis of cognitive radio networks with imperfect sensing Isameldin Suliman, Janne Lehtomäki and Timo Bräysy Centre for Wireless Communications CWC University of Oulu Oulu, Finland Kenta Umebayashi Tokyo

More information

Accessing the Hidden Available Spectrum in Cognitive Radio Networks under GSM-based Primary Networks

Accessing the Hidden Available Spectrum in Cognitive Radio Networks under GSM-based Primary Networks Accessing the Hidden Available Spectrum in Cognitive Radio Networks under GSM-based Primary Networks Antara Hom Chowdhury, Yi Song, and Chengzong Pang Department of Electrical Engineering and Computer

More information

DYNAMIC SPECTRUM ACCESS AND SHARING USING 5G IN COGNITIVE RADIO

DYNAMIC SPECTRUM ACCESS AND SHARING USING 5G IN COGNITIVE RADIO DYNAMIC SPECTRUM ACCESS AND SHARING USING 5G IN COGNITIVE RADIO Ms.Sakthi Mahaalaxmi.M UG Scholar, Department of Information Technology, Ms.Sabitha Jenifer.A UG Scholar, Department of Information Technology,

More information

Achievable Transmission Capacity of Cognitive Radio Networks with Cooperative Relaying

Achievable Transmission Capacity of Cognitive Radio Networks with Cooperative Relaying Achievable Transmission Capacity of Cognitive Radio Networks with Cooperative Relaying Xiuying Chen, Tao Jing, Yan Huo, Wei Li 2, Xiuzhen Cheng 2, Tao Chen 3 School of Electronics and Information Engineering,

More information

Hedonic Coalition Formation Games for Secondary Base Station Cooperation in Cognitive Radio Networks

Hedonic Coalition Formation Games for Secondary Base Station Cooperation in Cognitive Radio Networks Hedonic Coalition Formation Games for Secondary Base Station Cooperation in Cognitive Radio Networks Walid Saad 1, Zhu Han, Tamer Başar 3, Are Hjørungnes 1, and Ju Bin Song 4 1 UNIK - University Graduate

More information

SPECTRUM resources are scarce and fixed spectrum allocation

SPECTRUM resources are scarce and fixed spectrum allocation Hedonic Coalition Formation Game for Cooperative Spectrum Sensing and Channel Access in Cognitive Radio Networks Xiaolei Hao, Man Hon Cheung, Vincent W.S. Wong, Senior Member, IEEE, and Victor C.M. Leung,

More information

A Game Theory based Model for Cooperative Spectrum Sharing in Cognitive Radio

A Game Theory based Model for Cooperative Spectrum Sharing in Cognitive Radio Research Article International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347-5161 2014 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet A Game

More information

Cognitive Radio Spectrum Access with Prioritized Secondary Users

Cognitive Radio Spectrum Access with Prioritized Secondary Users Appl. Math. Inf. Sci. Vol. 6 No. 2S pp. 595S-601S (2012) Applied Mathematics & Information Sciences An International Journal @ 2012 NSP Natural Sciences Publishing Cor. Cognitive Radio Spectrum Access

More information

Cooperative Spectrum Sharing in Cognitive Radio Networks: A Game-Theoretic Approach

Cooperative Spectrum Sharing in Cognitive Radio Networks: A Game-Theoretic Approach Cooperative Spectrum Sharing in Cognitive Radio Networks: A Game-Theoretic Approach Haobing Wang, Lin Gao, Xiaoying Gan, Xinbing Wang, Ekram Hossain 2. Department of Electronic Engineering, Shanghai Jiao

More information

Reinforcement Learning-based Cooperative Sensing in Cognitive Radio Ad Hoc Networks

Reinforcement Learning-based Cooperative Sensing in Cognitive Radio Ad Hoc Networks 2st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications Reinforcement Learning-based Cooperative Sensing in Cognitive Radio Ad Hoc Networks Brandon F. Lo and Ian F.

More information

Energy Detection Technique in Cognitive Radio System

Energy Detection Technique in Cognitive Radio System International Journal of Engineering & Technology IJET-IJENS Vol:13 No:05 69 Energy Detection Technique in Cognitive Radio System M.H Mohamad Faculty of Electronic and Computer Engineering Universiti Teknikal

More information

ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS. Xiaohua Li and Wednel Cadeau

ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS. Xiaohua Li and Wednel Cadeau ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS Xiaohua Li and Wednel Cadeau Department of Electrical and Computer Engineering State University of New York at Binghamton Binghamton, NY 392 {xli, wcadeau}@binghamton.edu

More information

Cooperative Diversity Routing in Wireless Networks

Cooperative Diversity Routing in Wireless Networks Cooperative Diversity Routing in Wireless Networks Mostafa Dehghan, Majid Ghaderi, and Dennis L. Goeckel Department of Computer Science, University of Calgary, Emails: {mdehghan, mghaderi}@ucalgary.ca

More information

Malicious User Detection based on Low-Rank Matrix Completion in Wideband Spectrum Sensing

Malicious User Detection based on Low-Rank Matrix Completion in Wideband Spectrum Sensing Malicious User Detection based on Low-Rank Matrix Completion in Wideband Spectrum Sensing Qin, Z; Gao, Y; Plumbley, MD 27 IEEE. Personal use of this material is permitted. Permission from IEEE must be

More information

Cooperative communication with regenerative relays for cognitive radio networks

Cooperative communication with regenerative relays for cognitive radio networks 1 Cooperative communication with regenerative relays for cognitive radio networks Tuan Do and Brian L. Mark Dept. of Electrical and Computer Engineering George Mason University, MS 1G5 4400 University

More information

Spectrum Sensing and Data Transmission Tradeoff in Cognitive Radio Networks

Spectrum Sensing and Data Transmission Tradeoff in Cognitive Radio Networks Spectrum Sensing Data Transmission Tradeoff in Cognitive Radio Networks Yulong Zou Yu-Dong Yao Electrical Computer Engineering Department Stevens Institute of Technology, Hoboken 73, USA Email: Yulong.Zou,

More information

A new Opportunistic MAC Layer Protocol for Cognitive IEEE based Wireless Networks

A new Opportunistic MAC Layer Protocol for Cognitive IEEE based Wireless Networks A new Opportunistic MAC Layer Protocol for Cognitive IEEE 8.11-based Wireless Networks Abderrahim Benslimane,ArshadAli, Abdellatif Kobbane and Tarik Taleb LIA/CERI, University of Avignon, Agroparc BP 18,

More information

Challenges of spectrum sensing in cognitive radios. Public CWC & VTT GIGA Seminar 08 4th December 2008

Challenges of spectrum sensing in cognitive radios. Public CWC & VTT GIGA Seminar 08 4th December 2008 Challenges of spectrum sensing in cognitive radios Marja Matinmikko Public CWC & VTT GIGA Seminar 08 4th December 2008 Outline Introduction Current spectrum use Challenges Performance metrics Interference

More information

Cooperative Compressed Sensing for Decentralized Networks

Cooperative Compressed Sensing for Decentralized Networks Cooperative Compressed Sensing for Decentralized Networks Zhi (Gerry) Tian Dept. of ECE, Michigan Tech Univ. A presentation at ztian@mtu.edu February 18, 2011 Ground-Breaking Recent Advances (a1) s is

More information

Energy Detection Spectrum Sensing Technique in Cognitive Radio over Fading Channels Models

Energy Detection Spectrum Sensing Technique in Cognitive Radio over Fading Channels Models Energy Detection Spectrum Sensing Technique in Cognitive Radio over Fading Channels Models Kandunuri Kalyani, MTech G. Narayanamma Institute of Technology and Science, Hyderabad Y. Rakesh Kumar, Asst.

More information

OPTIMUM RELAY SELECTION FOR COOPERATIVE SPECTRUM SENSING AND TRANSMISSION IN COGNITIVE NETWORKS

OPTIMUM RELAY SELECTION FOR COOPERATIVE SPECTRUM SENSING AND TRANSMISSION IN COGNITIVE NETWORKS OPTIMUM RELAY SELECTION FOR COOPERATIVE SPECTRUM SENSING AND TRANSMISSION IN COGNITIVE NETWORKS Hasan Kartlak Electric Program, Akseki Vocational School Akdeniz University Antalya, Turkey hasank@akdeniz.edu.tr

More information

Improved Directional Perturbation Algorithm for Collaborative Beamforming

Improved Directional Perturbation Algorithm for Collaborative Beamforming American Journal of Networks and Communications 2017; 6(4): 62-66 http://www.sciencepublishinggroup.com/j/ajnc doi: 10.11648/j.ajnc.20170604.11 ISSN: 2326-893X (Print); ISSN: 2326-8964 (Online) Improved

More information

Optimal Defense Against Jamming Attacks in Cognitive Radio Networks using the Markov Decision Process Approach

Optimal Defense Against Jamming Attacks in Cognitive Radio Networks using the Markov Decision Process Approach Optimal Defense Against Jamming Attacks in Cognitive Radio Networks using the Markov Decision Process Approach Yongle Wu, Beibei Wang, and K. J. Ray Liu Department of Electrical and Computer Engineering,

More information

Performance Analysis of Self-Scheduling Multi-channel Cognitive MAC Protocols under Imperfect Sensing Environment

Performance Analysis of Self-Scheduling Multi-channel Cognitive MAC Protocols under Imperfect Sensing Environment Performance Analysis of Self-Seduling Multi-annel Cognitive MAC Protocols under Imperfect Sensing Environment Mingyu Lee 1, Seyoun Lim 2, Tae-Jin Lee 1 * 1 College of Information and Communication Engineering,

More information

Utilization of Multipaths for Spread-Spectrum Code Acquisition in Frequency-Selective Rayleigh Fading Channels

Utilization of Multipaths for Spread-Spectrum Code Acquisition in Frequency-Selective Rayleigh Fading Channels 734 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 49, NO. 4, APRIL 2001 Utilization of Multipaths for Spread-Spectrum Code Acquisition in Frequency-Selective Rayleigh Fading Channels Oh-Soon Shin, Student

More information

Joint Congestion Control and Routing Subject to Dynamic Interruptions in Cognitive Radio Networks

Joint Congestion Control and Routing Subject to Dynamic Interruptions in Cognitive Radio Networks Joint Congestion Control and Routing Subject to Dynamic Interruptions in Cognitive Radio Networks Husheng Li Department of EECS University of Tennessee Knoxville, TN 37996 Email: husheng@eecs.utk.edu Lijun

More information

Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks using Markov Chain and Game Theory

Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks using Markov Chain and Game Theory Selfish Attacks and Detection in Cognitive Radio Ad-Hoc Networks using Markov Chain and Game Theory Suchita S. Potdar 1, Dr. Mallikarjun M. Math 1 Department of Compute Science & Engineering, KLS, Gogte

More information

OPPORTUNISTIC SPECTRUM ACCESS IN MULTI-USER MULTI-CHANNEL COGNITIVE RADIO NETWORKS

OPPORTUNISTIC SPECTRUM ACCESS IN MULTI-USER MULTI-CHANNEL COGNITIVE RADIO NETWORKS 9th European Signal Processing Conference (EUSIPCO 0) Barcelona, Spain, August 9 - September, 0 OPPORTUNISTIC SPECTRUM ACCESS IN MULTI-USER MULTI-CHANNEL COGNITIVE RADIO NETWORKS Sachin Shetty, Kodzo Agbedanu,

More information

Primary User Emulation Attack Analysis on Cognitive Radio

Primary User Emulation Attack Analysis on Cognitive Radio Indian Journal of Science and Technology, Vol 9(14), DOI: 10.17485/ijst/016/v9i14/8743, April 016 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Primary User Emulation Attack Analysis on Cognitive

More information

Journal of Asian Scientific Research DEVELOPMENT OF A COGNITIVE RADIO MODEL USING WAVELET PACKET TRANSFORM - BASED ENERGY DETECTION TECHNIQUE

Journal of Asian Scientific Research DEVELOPMENT OF A COGNITIVE RADIO MODEL USING WAVELET PACKET TRANSFORM - BASED ENERGY DETECTION TECHNIQUE Journal of Asian Scientific Research ISSN(e): 2223-1331/ISSN(p): 2226-5724 URL: www.aessweb.com DEVELOPMENT OF A COGNITIVE RADIO MODEL USING WAVELET PACKET TRANSFORM - BASED ENERGY DETECTION TECHNIQUE

More information

Adaptive DS/CDMA Non-Coherent Receiver using MULTIUSER DETECTION Technique

Adaptive DS/CDMA Non-Coherent Receiver using MULTIUSER DETECTION Technique Adaptive DS/CDMA Non-Coherent Receiver using MULTIUSER DETECTION Technique V.Rakesh 1, S.Prashanth 2, V.Revathi 3, M.Satish 4, Ch.Gayatri 5 Abstract In this paper, we propose and analyze a new non-coherent

More information

Stochastic Channel Prioritization for Spectrum Sensing in Cooperative Cognitive Radio

Stochastic Channel Prioritization for Spectrum Sensing in Cooperative Cognitive Radio Stochastic Channel Prioritization for Spectrum Sensing in Cooperative Cognitive Radio Xiaoyu Wang, Alexander Wong, and Pin-Han Ho Department of Electrical and Computer Engineering Department of Systems

More information

Responsive Communication Jamming Detector with Noise Power Fluctuation using Cognitive Radio

Responsive Communication Jamming Detector with Noise Power Fluctuation using Cognitive Radio Responsive Communication Jamming Detector with Noise Power Fluctuation using Cognitive Radio Mohsen M. Tanatwy Associate Professor, Dept. of Network., National Telecommunication Institute, Cairo, Egypt

More information

Address: 9110 Judicial Dr., Apt. 8308, San Diego, CA Phone: (240) URL:

Address: 9110 Judicial Dr., Apt. 8308, San Diego, CA Phone: (240) URL: Yongle Wu CONTACT INFORMATION Address: 9110 Judicial Dr., Apt. 8308, San Diego, CA 92122 Phone: (240)678-6461 Email: wuyongle@gmail.com URL: http://www.cspl.umd.edu/yongle/ EDUCATION University of Maryland,

More information

A survey on broadcast protocols in multihop cognitive radio ad hoc network

A survey on broadcast protocols in multihop cognitive radio ad hoc network A survey on broadcast protocols in multihop cognitive radio ad hoc network Sureshkumar A, Rajeswari M Abstract In the traditional ad hoc network, common channel is present to broadcast control channels

More information

Link Level Capacity Analysis in CR MIMO Networks

Link Level Capacity Analysis in CR MIMO Networks Volume 114 No. 8 2017, 13-21 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu Link Level Capacity Analysis in CR MIMO Networks 1M.keerthi, 2 Y.Prathima Devi,

More information

Cooperation and Coordination in Cognitive Networks with Packet Retransmission

Cooperation and Coordination in Cognitive Networks with Packet Retransmission Cooperation and Coordination in Cognitive Networks with Packet Retransmission Marco Levorato, Osvaldo Simeone, Urbashi Mitra, Michele Zorzi Dept. of Information Engineering, University of Padova, via Gradenigo

More information

Cognitive Radio Techniques

Cognitive Radio Techniques Cognitive Radio Techniques Spectrum Sensing, Interference Mitigation, and Localization Kandeepan Sithamparanathan Andrea Giorgetti ARTECH HOUSE BOSTON LONDON artechhouse.com Contents Preface xxi 1 Introduction

More information

A Two-Layer Coalitional Game among Rational Cognitive Radio Users

A Two-Layer Coalitional Game among Rational Cognitive Radio Users A Two-Layer Coalitional Game among Rational Cognitive Radio Users This research was supported by the NSF grant CNS-1018447. Yuan Lu ylu8@ncsu.edu Alexandra Duel-Hallen sasha@ncsu.edu Department of Electrical

More information

Application of combined TOPSIS and AHP method for Spectrum Selection in Cognitive Radio by Channel Characteristic Evaluation

Application of combined TOPSIS and AHP method for Spectrum Selection in Cognitive Radio by Channel Characteristic Evaluation International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 10, Number 2 (2017), pp. 71 79 International Research Publication House http://www.irphouse.com Application of

More information

COGNITIVE radio (CR) [1] [3] solves the spectrum congestion

COGNITIVE radio (CR) [1] [3] solves the spectrum congestion 56 IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, VOL. 5, NO. 1, FEBRUARY 2011 Cooperative Spectrum Sensing Strategies for Cognitive Radio Mesh Networks Qian Chen, Student Member, IEEE, Mehul Motani,

More information

Spectrum Sensing Methods for Cognitive Radio: A Survey Pawandeep * and Silki Baghla

Spectrum Sensing Methods for Cognitive Radio: A Survey Pawandeep * and Silki Baghla Spectrum Sensing Methods for Cognitive Radio: A Survey Pawandeep * and Silki Baghla JCDM College of Engineering Sirsa, Haryana, India Abstract: One of the most challenging issues in cognitive radio systems

More information

A Quality of Service aware Spectrum Decision for Cognitive Radio Networks

A Quality of Service aware Spectrum Decision for Cognitive Radio Networks A Quality of Service aware Spectrum Decision for Cognitive Radio Networks 1 Gagandeep Singh, 2 Kishore V. Krishnan Corresponding author* Kishore V. Krishnan, Assistant Professor (Senior) School of Electronics

More information

On the Performance of Cooperative Routing in Wireless Networks

On the Performance of Cooperative Routing in Wireless Networks 1 On the Performance of Cooperative Routing in Wireless Networks Mostafa Dehghan, Majid Ghaderi, and Dennis L. Goeckel Department of Computer Science, University of Calgary, Emails: {mdehghan, mghaderi}@ucalgary.ca

More information

Downlink Erlang Capacity of Cellular OFDMA

Downlink Erlang Capacity of Cellular OFDMA Downlink Erlang Capacity of Cellular OFDMA Gauri Joshi, Harshad Maral, Abhay Karandikar Department of Electrical Engineering Indian Institute of Technology Bombay Powai, Mumbai, India 400076. Email: gaurijoshi@iitb.ac.in,

More information

Imperfect Monitoring in Multi-agent Opportunistic Channel Access

Imperfect Monitoring in Multi-agent Opportunistic Channel Access Imperfect Monitoring in Multi-agent Opportunistic Channel Access Ji Wang Thesis submitted to the Faculty of the Virginia Polytechnic Institute and State University in partial fulfillment of the requirements

More information

Selfish Attack Detection in Cognitive Ad-Hoc Network

Selfish Attack Detection in Cognitive Ad-Hoc Network Selfish Attack Detection in Cognitive Ad-Hoc Network Mr. Nilesh Rajendra Chougule Student, KIT s College of Engineering, Kolhapur nilesh_chougule18@yahoo.com Dr.Y.M.PATIL Professor, KIT s college of Engineering,

More information

Spectrum Sensing Using Bayesian Method for Maximum Spectrum Utilization in Cognitive Radio

Spectrum Sensing Using Bayesian Method for Maximum Spectrum Utilization in Cognitive Radio 5 Spectrum Sensing Using Bayesian Method for Maximum Spectrum Utilization in Cognitive Radio Anurama Karumanchi, Mohan Kumar Badampudi 2 Research Scholar, 2 Assoc. Professor, Dept. of ECE, Malla Reddy

More information

Delay Performance Modeling and Analysis in Clustered Cognitive Radio Networks

Delay Performance Modeling and Analysis in Clustered Cognitive Radio Networks Delay Performance Modeling and Analysis in Clustered Cognitive Radio Networks Nadia Adem and Bechir Hamdaoui School of Electrical Engineering and Computer Science Oregon State University, Corvallis, Oregon

More information

Collaborative Compressive Sensing based Dynamic Spectrum Sensing and Mobile Primary User Localization in Cognitive Radio Networks

Collaborative Compressive Sensing based Dynamic Spectrum Sensing and Mobile Primary User Localization in Cognitive Radio Networks Collaborative Compressive Sensing based Dynamic Spectrum Sensing and Mobile Primary User Localization in Cognitive Radio Networks Lanchao Liu and Zhu Han ECE Department University of Houston Houston, Texas

More information

Cognitive Radio: a (biased) overview

Cognitive Radio: a (biased) overview cmurthy@ece.iisc.ernet.in Dept. of ECE, IISc Apr. 10th, 2008 Outline Introduction Definition Features & Classification Some Fun 1 Introduction to Cognitive Radio What is CR? The Cognition Cycle On a Lighter

More information

End-to-End Known-Interference Cancellation (E2E-KIC) with Multi-Hop Interference

End-to-End Known-Interference Cancellation (E2E-KIC) with Multi-Hop Interference End-to-End Known-Interference Cancellation (EE-KIC) with Multi-Hop Interference Shiqiang Wang, Qingyang Song, Kailai Wu, Fanzhao Wang, Lei Guo School of Computer Science and Engnineering, Northeastern

More information

OPPORTUNISTIC spectrum access (OSA), first envisioned

OPPORTUNISTIC spectrum access (OSA), first envisioned IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 5, MAY 2008 2053 Joint Design and Separation Principle for Opportunistic Spectrum Access in the Presence of Sensing Errors Yunxia Chen, Student Member,

More information

Low-Complexity Approaches to Spectrum Opportunity Tracking

Low-Complexity Approaches to Spectrum Opportunity Tracking Low-Complexity Approaches to Spectrum Opportunity Tracking (Invited Paper) Qing Zhao University of California Davis, CA 95616 Email: qzhao@ece.ucdavis.edu Bhaskar Krishnamachari University of Southern

More information

Channel Assignment Schemes for Cooperative Spectrum Sensing in Multi-Channel Cognitive Radio Networks

Channel Assignment Schemes for Cooperative Spectrum Sensing in Multi-Channel Cognitive Radio Networks WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 201X; 00:2 26 Channel Assignment Schemes for Cooperative Spectrum Sensing in Multi-Channel Cognitive Radio Networks Weiwei Wang,

More information

Analysis of Interference in Cognitive Radio Networks with Unknown Primary Behavior

Analysis of Interference in Cognitive Radio Networks with Unknown Primary Behavior EEE CC 22 - Cognitive Radio and Networks Symposium Analysis of nterference in Cognitive Radio Networks with Unknown Primary Behavior Chunxiao Jiang, Yan Chen,K.J.RayLiu and Yong Ren Department of Electrical

More information