Abstract
Cognitive radio (CR) is a promising concept for improving the utilization of scarce radio spectrum resources. A reliable strategy for the detection of unused spectrum bands is essential to the design and practical implementation of CR systems. It is widely accepted that in a real-world environment, cooperative spectrum sensing involving many secondary users scattered in a wide geographical area can greatly improve sensing accuracy. However, some secondary users may misbehave, i.e. provide false sensing information, in an attempt to maximize their own utility gains. Such selfish behaviour, if unchecked, can severely impact the operation of the CR system. In this paper, we propose a novel trustaware hybrid spectrum sensing scheme which can detect misbehaving secondary users and filter out their reported spectrum sensing results from the decision making process. The robustness and efficiency of the proposed scheme are verified through extensive computer simulations.
- Federal Communications Commission, "Spectrum Policy Task Force," Report of ET Docket 02-135, Nov. 2002.Google Scholar
- S. Haykin, "Cognitive radio: brain-empowered wireless communications," IEEE Journal on Selected Areas in Communications, vol. 23, no. 2, pp. 201--220, Feb. 2005. Google ScholarDigital Library
- N. Ilisei, "A Survey on Dynamic Spectrum Allocation Protocols," in Proc. of 8th International Conference on Development and Application Systems, May 2006, pp. 177--180.Google Scholar
- S. Mishra et al., "Cooperative Sensing among Cognitive Radios," in Proc. of IEEE International Conference on Communications, vol. 4, Jun. 2006, pp. 1658--1663.Google Scholar
- R. Chen et al., "Toward secure distributed spectrum sensing in cognitive radio networks," IEEE Communications Magazine, vol. 46, no. 4, pp. 50--55, April 2008. Google ScholarDigital Library
- T.C. Clancy and N. Goergen, "Security in Cognitive Radio Networks: Threats and Mitigation," in Proc. of 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications, May 2008, pp. 1--8.Google Scholar
- A. Jøsang et al., "A survey of trust and reputation systems for online service provision," Decision Support Systems, vol. 43, no. 2, pp. 618--644, Mar. 2007. Google ScholarDigital Library
- D. Gambetta, Can We Trust Trust, in Trust: Making and Breaking Cooperative Relations. University of Oxford, 2000.Google Scholar
- C.C. Loh et al., "Identifying unique devices through wireless fingerprinting," in Proc. of the first ACM conference on Wireless network security, Mar. 2008, pp. 46--55. Google ScholarDigital Library
- K.C. Chen et al., "Cognitive radio network architecture: part II -- trusted network layer structure," in Proc. of the 2nd international conference on Ubiquitous information management and communication, April 2008, pp. 120--124. Google ScholarDigital Library
- I.M. Atakli et al., "Malicious node detection in wireless sensor networks using weighted trust evaluation," in Proc. of the 2008 Spring simulation multiconference, April 2008, pp. 836--843. Google ScholarDigital Library
- K.C. Chen et al., "Cognitive radio network architecture: part I -- general structure," in Proc. of the 2nd international conference on Ubiquitous information management and communication, April 2008, pp. 114--119. Google ScholarDigital Library
- I.F. Akyildiz et al., "NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey," Computer Networks, vol. 50, pp. 2127--2159, 2006. Google ScholarDigital Library
- W.Y. Lee and I.F. Akyildiz, "Optimal Spectrum Sensing Framework for Cognitive Radio Networks," IEEE Transactions on Wireless Communications, vol. 7, no. 10, pp. 3845--3857, Oct. 2008. Google ScholarDigital Library
- R. Chen and J.H. Reed, "Defense against Primary User Emulation Attacks in Cognitive Radio Networks," IEEE Journal on Selected Areas in Communications, vol. 26, no. 1, pp. 25--37, Jan. 2008. Google ScholarDigital Library
- A. Jøsang and R. Ismail, "The Beta Reputation System," in Proc. of the 15th Bled Electronic Commerce Conference, Jun. 2002.Google Scholar
Index Terms
- Towards a trust aware cognitive radio architecture
Recommendations
Towards energy-efficient cooperative spectrum sensing for cognitive radio networks: an overview
Cognitive radio has been proposed as a promising technology to resolve the spectrum scarcity problem by dynamically exploiting underutilized spectrum bands. Cognitive radio technology allows unlicensed users to exploit the spectrum vacancies at any time ...
A software-defined radio based cognitive radio demonstration over FM band
Recent Advances in Wireless Communications and NetworksIn this paper, we present a software-defined radio (SDR) based cognitive radio (CR) implementation and demonstration over the frequency modulation (FM) band. Using GNU Radio as the software platform and USRP (Universal Software Radio Peripheral) SDR ...
Spectrum Allocation Algorithm Aware Spectrum Aggregation in Cognitive Radio Networks
IMCCC '13: Proceedings of the 2013 Third International Conference on Instrumentation, Measurement, Computer, Communication and ControlThe low spectrum utilization has limited the development of wireless communication is a common view In Cognitive Radio (CR). And the idle spectrum holes are too narrow to support high-speed communication is an another problem. The spectrum aggregation ...
Comments