Abstract
This work analyses the performance of a Dynamic Spectrum Access (DSA) network with secondary nodes to provide Internet services, and studies the impact of malicious nodes and cooperative secondary nodes on the performance of the network and spectrum utilization. The work mathematically models the throughput, latency, and spectrum utilization with varying numbers of malicious nodes, secondary nodes, miss probabilities, and false alarm probabilities, and studies their effect on performance of the network. The results point to rapid spectrum starvation as the number of malicious nodes increase, as well as the negative impact of too many secondary nodes crowding out available spectrum with resultant degradation of throughput and latency.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Kaligineedi, P., Khabbazian, M., Bhargava, V.K.: Secure cooperative sensing techniques for cognitive radio systems. In: 2008 IEEE International Conference on Communications, pp. 3406–3410 (2008)
Yu, F.R., et al.: Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios. In: 2009 Military Communications Conference, MILCOM 2009. IEEE (2009)
Chen, R., Park, J.-M., Bian, K.: Robust distributed spectrum sensing in cognitive radio networks. In: INFOCOM 2008, The 27th Conference on Computer Communications. IEEE (2008)
Mfupe, L., Mekuria, F., Montsi, L., Mzyece, M.: Geo-location white space spectrum databases: review of models and design of a dynamic spectrum access coexistence planner and manager. In: Mishra, A., Johnson, D. (eds.) White Space Communication, pp. 153–194. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-08747-4_6
Bouassida, M.S., et al.: Sybil nodes detection based on received signal strength variations within VANET. Int. J. Netw. Secur. 9(1), 22–33 (2009)
Othman, A.K., Adams, A.E., Tsimenidis, C.C.: Node discovery protocol and localization for distributed underwater acoustic networks. In: 2006 International Conference on Internet and Web Applications and Services/Advanced International Conference on Telecommunications, AICT-ICIW 2006. IEEE (2006)
Takyi, A., Densmore, M., Johnson, D.: Collaborative neighbour monitoring in TV white space network. In: Proceedings Southern Africa Telecommunication Networks and Applications Conference (SATNAC 2016), George, South Africa (2016)
Jin, Z., Anand, S., Subbalakshmi, K.P.: Detecting primary user emulation attacks in dynamic spectrum access networks. In: 2009 IEEE International Conference on Communications, ICC 2009. IEEE (2009)
Sharma, S.K., Chatzinotas, S., Ottersten, B.: Cooperative spectrum sensing for heterogeneous sensor networks using multiple decision statistics. In: Weichold, M., Hamdi, M., Shakir, M.Z., Abdallah, M., Karagiannidis, G.K., Ismail, M. (eds.) CrownCom 2015. LNICST, vol. 156, pp. 321–333. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-24540-9_26
Jain, M., Kumar, V., Gangopadhyay, R., Debnath, S.: Cooperative spectrum sensing using improved p-norm detector in generalized \(\kappa \)-\(\mu \) fading channel. In: Weichold, M., Hamdi, M., Shakir, M., Abdallah, M., Karagiannidis, G., Ismail, M. (eds.) CrownCom 2015. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 156, pp. 225–234. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-24540-9_18
Pinifolo, J., et al.: Successful deployment and key applications of television white space networks (TVWS) in Malawi. In: Proceedings and Report of the 7th UbuntuNet Alliance Annual Conference, pp. 347–354 (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Takyi, A., Densmore, M., Hadzic, S., Johnson, D. (2018). Performance Analysis of a Collaborative DSA-Based Network with Malicious Nodes. In: Odumuyiwa, V., Adegboyega, O., Uwadia, C. (eds) e-Infrastructure and e-Services for Developing Countries. AFRICOMM 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 250. Springer, Cham. https://doi.org/10.1007/978-3-319-98827-6_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-98827-6_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-98826-9
Online ISBN: 978-3-319-98827-6
eBook Packages: Computer ScienceComputer Science (R0)