skip to main content
research-article

Towards a trust aware cognitive radio architecture

Authors Info & Claims
Published:25 September 2009Publication History
Skip Abstract Section

Abstract

Cognitive radio (CR) is a promising concept for improving the utilization of scarce radio spectrum resources. A reliable strategy for the detection of unused spectrum bands is essential to the design and practical implementation of CR systems. It is widely accepted that in a real-world environment, cooperative spectrum sensing involving many secondary users scattered in a wide geographical area can greatly improve sensing accuracy. However, some secondary users may misbehave, i.e. provide false sensing information, in an attempt to maximize their own utility gains. Such selfish behaviour, if unchecked, can severely impact the operation of the CR system. In this paper, we propose a novel trustaware hybrid spectrum sensing scheme which can detect misbehaving secondary users and filter out their reported spectrum sensing results from the decision making process. The robustness and efficiency of the proposed scheme are verified through extensive computer simulations.

References

  1. Federal Communications Commission, "Spectrum Policy Task Force," Report of ET Docket 02-135, Nov. 2002.Google ScholarGoogle Scholar
  2. S. Haykin, "Cognitive radio: brain-empowered wireless communications," IEEE Journal on Selected Areas in Communications, vol. 23, no. 2, pp. 201--220, Feb. 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. N. Ilisei, "A Survey on Dynamic Spectrum Allocation Protocols," in Proc. of 8th International Conference on Development and Application Systems, May 2006, pp. 177--180.Google ScholarGoogle Scholar
  4. S. Mishra et al., "Cooperative Sensing among Cognitive Radios," in Proc. of IEEE International Conference on Communications, vol. 4, Jun. 2006, pp. 1658--1663.Google ScholarGoogle Scholar
  5. R. Chen et al., "Toward secure distributed spectrum sensing in cognitive radio networks," IEEE Communications Magazine, vol. 46, no. 4, pp. 50--55, April 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. T.C. Clancy and N. Goergen, "Security in Cognitive Radio Networks: Threats and Mitigation," in Proc. of 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications, May 2008, pp. 1--8.Google ScholarGoogle Scholar
  7. A. Jøsang et al., "A survey of trust and reputation systems for online service provision," Decision Support Systems, vol. 43, no. 2, pp. 618--644, Mar. 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. D. Gambetta, Can We Trust Trust, in Trust: Making and Breaking Cooperative Relations. University of Oxford, 2000.Google ScholarGoogle Scholar
  9. C.C. Loh et al., "Identifying unique devices through wireless fingerprinting," in Proc. of the first ACM conference on Wireless network security, Mar. 2008, pp. 46--55. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. K.C. Chen et al., "Cognitive radio network architecture: part II -- trusted network layer structure," in Proc. of the 2nd international conference on Ubiquitous information management and communication, April 2008, pp. 120--124. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. I.M. Atakli et al., "Malicious node detection in wireless sensor networks using weighted trust evaluation," in Proc. of the 2008 Spring simulation multiconference, April 2008, pp. 836--843. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. K.C. Chen et al., "Cognitive radio network architecture: part I -- general structure," in Proc. of the 2nd international conference on Ubiquitous information management and communication, April 2008, pp. 114--119. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. I.F. Akyildiz et al., "NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey," Computer Networks, vol. 50, pp. 2127--2159, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. W.Y. Lee and I.F. Akyildiz, "Optimal Spectrum Sensing Framework for Cognitive Radio Networks," IEEE Transactions on Wireless Communications, vol. 7, no. 10, pp. 3845--3857, Oct. 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. R. Chen and J.H. Reed, "Defense against Primary User Emulation Attacks in Cognitive Radio Networks," IEEE Journal on Selected Areas in Communications, vol. 26, no. 1, pp. 25--37, Jan. 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. A. Jøsang and R. Ismail, "The Beta Reputation System," in Proc. of the 15th Bled Electronic Commerce Conference, Jun. 2002.Google ScholarGoogle Scholar

Index Terms

  1. Towards a trust aware cognitive radio architecture

                Recommendations

                Comments

                Login options

                Check if you have access through your login credentials or your institution to get full access on this article.

                Sign in

                Full Access

                • Published in

                  cover image ACM SIGMOBILE Mobile Computing and Communications Review
                  ACM SIGMOBILE Mobile Computing and Communications Review  Volume 13, Issue 2
                  April 2009
                  106 pages
                  ISSN:1559-1662
                  EISSN:1931-1222
                  DOI:10.1145/1621076
                  Issue’s Table of Contents

                  Copyright © 2009 Authors

                  Publisher

                  Association for Computing Machinery

                  New York, NY, United States

                  Publication History

                  • Published: 25 September 2009

                  Check for updates

                  Qualifiers

                  • research-article

                PDF Format

                View or Download as a PDF file.

                PDF

                eReader

                View online with eReader.

                eReader