2,236 research outputs found

    Spectrum Sensing in Cognitive Radio: Bootstrap and Sequential Detection Approaches

    Get PDF
    In this thesis, advanced techniques for spectrum sensing in cognitive radio are addressed. The problem of small sample size in spectrum sensing is considered, and resampling-based methods are developed for local and collaborative spectrum sensing. A method to deal with unknown parameters in sequential testing for spectrum sensing is proposed. Moreover, techniques are developed for multiband sensing, spectrum sensing in low signal to noise ratio, and two-bits hard decision combining for collaborative spectrum sensing. The assumption of using large sample size in spectrum sensing often raises a problem when the devised test statistic is implemented with a small sample size. This is because, for small sample sizes, the asymptotic approximation for the distribution of the test statistic under the null hypothesis fails to model the true distribution. Therefore, the probability of false alarm or miss detection of the test statistic is poor. In this respect, we propose to use bootstrap methods, where the distribution of the test statistic is estimated by resampling the observed data. For local spectrum sensing, we propose the null-resampling bootstrap test which exhibits better performances than the pivot bootstrap test and the asymptotic test, as common approaches. For collaborative spectrum sensing, a resampling-based Chair-Varshney fusion rule is developed. At the cognitive radio user, a combination of independent resampling and moving-block resampling is proposed to estimate the local probability of detection. At the fusion center, the parametric bootstrap is applied when the number of cognitive radio users is large. The sequential probability ratio test (SPRT) is designed to test a simple hypothesis against a simple alternative hypothesis. However, the more realistic scenario in spectrum sensing is to deal with composite hypotheses, where the parameters are not uniquely defined. In this thesis, we generalize the sequential probability ratio test to cope with composite hypotheses, wherein the thresholds are updated in an adaptive manner, using the parametric bootstrap. The resulting test avoids the asymptotic assumption made in earlier works. The proposed bootstrap based sequential probability ratio test minimizes decision errors due to errors induced by employing maximum likelihood estimators in the generalized sequential probability ratio test. Hence, the proposed method achieves the sensing objective. The average sample number (ASN) of the proposed method is better than that of the conventional method which uses the asymptotic assumption. Furthermore, we propose a mechanism to reduce the computational cost incurred by the bootstrap, using a convex combination of the latest K bootstrap distributions. The reduction in the computational cost does not impose a significant increase on the ASN, while the protection against decision errors is even better. This work is motivated by the fact that the sequential probability ratio test produces a smaller sensing time than its counterpart of fixed sample size test. A smaller sensing time is preferable to improve the throughput of the cognitive radio network. Moreover, multiband spectrum sensing is addressed, more precisely by using multiple testing procedures. In a context of a fixed sample size, an adaptive Benjamini-Hochberg procedure is suggested to be used, since it produces a better balance between the familywise error rate and the familywise miss detection, than the conventional Benjamini-Hochberg. For the sequential probability ratio test, we devise a method based on ordered stopping times. The results show that our method has smaller ASNs than the Bonferroni procedure. Another issue in spectrum sensing is to detect a signal when the signal to noise ratio is very low. In this case, we derive a locally optimum detector that is based on the assumption that the underlying noise is Student's t-distributed. The resulting scheme outperforms the energy detector in all scenarios. Last but not least, we extend the hard decision combining in collaborative spectrum sensing to include a quality information bit. In this case, the multiple thresholds are determined by a distance measure criterion. The hard decision combining with quality information performs better than the conventional hard decision combining

    Airborne Directional Networking: Topology Control Protocol Design

    Get PDF
    This research identifies and evaluates the impact of several architectural design choices in relation to airborne networking in contested environments related to autonomous topology control. Using simulation, we evaluate topology reconfiguration effectiveness using classical performance metrics for different point-to-point communication architectures. Our attention is focused on the design choices which have the greatest impact on reliability, scalability, and performance. In this work, we discuss the impact of several practical considerations of airborne networking in contested environments related to autonomous topology control modeling. Using simulation, we derive multiple classical performance metrics to evaluate topology reconfiguration effectiveness for different point-to-point communication architecture attributes for the purpose of qualifying protocol design elements

    Algorithms for 5G physical layer

    Get PDF
    There is a great activity in the research community towards the investigations of the various aspects of 5G at different protocol layers and parts of the network. Among all, physical layer design plays a very important role to satisfy high demands in terms of data rates, latency, reliability and number of connected devices for 5G deployment. This thesis addresses he latest developments in the physical layer algorithms regarding the channel coding, signal detection, frame synchronization and multiple access technique in the light of 5G use cases. These developments are governed by the requirements of the different use case scenarios that are envisioned to be the driving force in 5G. All chapters from chapter 2 to 5 are developed around the need of physical layer algorithms dedicated to 5G use cases. In brief, this thesis focuses on design, analysis, simulation and he advancement of physical layer aspects such as 1. Reliability based decoding of short length Linear Block Codes (LBCs) with very good properties in terms of minimum hamming istance for very small latency requiring applications. In this context, we enlarge the grid of possible candidates by considering, in particular, short length LBCs (especially extended CH codes) with soft-decision decoding; 2. Efficient synchronization of preamble/postamble in a short bursty frame using modified Massey correlator; 3. Detection of Primary User activity using semiblind spectrum sensing algorithms and analysis of such algorithms under practical imperfections; 4. Design of optimal spreading matrix for a Low Density Spreading (LDS) technique in the context of non-orthogonal multiple access. In such spreading matrix, small number of elements in a spreading sequences are non zero allowing each user to spread its data over small number of chips (tones), thus simplifying the decoding procedure using Message Passing Algorithm (MPA)

    Opportunistic Spectrum Utilization by Cognitive Radio Networks: Challenges and Solutions

    Get PDF
    Cognitive Radio Network (CRN) is an emerging paradigm that makes use of Dynamic Spectrum Access (DSA) to communicate opportunistically, in the un-licensed Industrial, Scientific and Medical bands or frequency bands otherwise licensed to incumbent users such as TV broadcast. Interest in the development of CRNs is because of severe under-utilization of spectrum bands by the incumbent Primary Users (PUs) that have the license to use them coupled with an ever-increasing demand for unlicensed spectrum for a variety of new mobile and wireless applications. The essence of Cognitive Radio (CR) operation is the cooperative and opportunistic utilization of licensed spectrum bands by the Secondary Users (SUs) that collectively form the CRN without causing any interference to PUs\u27 communications. CRN operation is characterized by factors such as network-wide quiet periods for cooperative spectrum sensing, opportunistic/dynamic spectrum access and non-deterministic operation of PUs. These factors can have a devastating impact on the overall throughput and can significantly increase the control overheads. Therefore, to support the same level of QoS as traditional wireless access technologies, very closer interaction is required between layers of the protocol stack. Opportunistic spectrum utilization without causing interference to the PUs is only possible if the SUs periodically sense the spectrum for the presence of PUs\u27 signal. To minimize the effects of hardware capabilities, terrain features and PUs\u27 transmission ranges, DSA is undertaken in a collaborative manner where SUs periodically carry out spectrum sensing in their respective geographical locations. Collaborative spectrum sensing has numerous security loopholes and can be favorable to malicious nodes in the network that may exploit vulnerabilities associated with DSA such as launching a spectrum sensing data falsification (SSDF) attack. Some CRN standards such as the IEEE 802.22 wireless regional area network employ a two-stage quiet period mechanism based on a mandatory Fast Sensing and an optional Fine Sensing stage for DSA. This arrangement is meant to strike a balance between the conflicting goals of proper protection of incumbent PUs\u27 signals and optimum QoS for SUs so that only as much time is spent for spectrum sensing as needed. Malicious nodes in the CRN however, can take advantage of the two-stage spectrum sensing mechanism to launch smart denial of service (DoS) jamming attacks on CRNs during the fast sensing stage. Coexistence protocols enable collocated CRNs to contend for and share the available spectrum. However, most coexistence protocols do not take into consideration the fact that channels of the available spectrum can be heterogeneous in the sense that they can vary in their characteristics and quality such as SNR or bandwidth. Without any mechanism to enforce fairness in accessing varying quality channels, ensuring coexistence with minimal contention and efficient spectrum utilization for CRNs is likely to become a very difficult task. The cooperative and opportunistic nature of communication has many challenges associated with CRNs\u27 operation. In view of the challenges described above, this dissertation presents solutions including cross-layer approaches, reputation system, optimization and game theoretic approaches to handle (1) degradation in TCP\u27s throughput resulting from packet losses and disruptions in spectrum availability due non-deterministic use of spectrum by the PUs (2) presence of malicious SUs in the CRN that may launch various attacks on CRNs\u27 including SSDF and jamming and (3) sharing of heterogeneous spectrum resources among collocated CRNs without a centralized mechanism to enforce cooperation among otherwise non-cooperative CRN

    Contributions to the security of cognitive radio networks

    Get PDF
    The increasing emergence of wireless applications along with the static spectrum allocation followed by regulatory bodies has led to a high inefficiency in spectrum usage, and the lack of spectrum for new services. In this context, Cognitive Radio (CR) technology has been proposed as a possible solution to reuse the spectrum being underutilized by licensed services. CRs are intelligent devices capable of sensing the medium and identifying those portions of the spectrum being unused. Based on their current perception of the environment and on that learned from past experiences, they can optimally tune themselves with regard to parameters such as frequency, coding and modulation, among others. Due to such properties, Cognitive Radio Networks (CRNs) can act as secondary users of the spectrum left unused by their legal owners or primary users, under the requirement of not interfering primary communications. The successful deployment of these networks relies on the proper design of mechanisms in order to efficiently detect spectrum holes, adapt to changing environment conditions and manage the available spectrum. Furthermore, the need for addressing security issues is evidenced by two facts. First, as for any other type of wireless network, the air is used as communications medium and can easily be accessed by attackers. On the other hand, the particular attributes of CRNs offer new opportunities to malicious users, ranging from providing wrong information on the radio environment to disrupting the cognitive mechanisms, which could severely undermine the operation of these networks. In this Ph.D thesis we have approached the challenge of securing Cognitive Radio Networks. Because CR technology is still evolving, to achieve this goal involves not only providing countermeasures for existing attacks but also to identify new potential threats and evaluate their impact on CRNs performance. The main contributions of this thesis can be summarized as follows. First, a critical study on the State of the Art in this area is presented. A qualitative analysis of those threats to CRNs already identified in the literature is provided, and the efficacy of existing countermeasures is discussed. Based on this work, a set of guidelines are designed in order to design a detection system for the main threats to CRNs. Besides, a high level description of the components of this system is provided, being it the second contribution of this thesis. The third contribution is the proposal of a new cross-layer attack to the Transmission Control Protocol (TCP) in CRNs. An analytical model of the impact of this attack on the throughput of TCP connections is derived, and a set of countermeasures in order to detect and mitigate the effect of such attack are proposed. One of the main threats to CRNs is the Primary User Emulation (PUE) attack. This attack prevents CRNs from using available portions of the spectrum and can even lead to a Denial of Service (DoS). In the fourth contribution of this the method is proposed in order to deal with such attack. The method relies on a set of time measures provided by the members of the network and allows estimating the position of an emitter. This estimation is then used to determine the legitimacy of a given transmission and detect PUE attacks. Cooperative methods are prone to be disrupted by malicious nodes reporting false data. This problem is addressed, in the context of cooperative location, in the fifth and last contribution of this thesis. A method based on Least Median Squares (LMS) fitting is proposed in order to detect forged measures and make the location process robust to them. The efficiency and accuracy of the proposed methodologies are demonstrated by means of simulation
    • …
    corecore