9,987 research outputs found

    Sparse Spectrum Sensing in Infrastructure-less Cognitive Radio Networks via Binary Consensus Algorithms

    Full text link
    Compressive Sensing has been utilized in Cognitive Radio Networks (CRNs) to exploit the sparse nature of the occupation of the primary users. Also, distributed spectrum sensing has been proposed to tackle the wireless channel problems, like node or link failures, rather than the common (centralized approach) for spectrum sensing. In this paper, we propose a distributed spectrum sensing framework based on consensus algorithms where SU nodes exchange their binary decisions to take global decisions without a fusion center to coordinate the sensing process. Each SU will share its decision with its neighbors, and at every new iteration each SU will take a new decision based on its current decision and the decisions it receives from its neighbors; in the next iteration, each SU will share its new decision with its neighbors. We show via simulations that the detection performance can tend to the performance of majority rule Fusion Center based CRNs

    Trust-aware Consensus-inspired Distributed Cooperative Spectrum Sensing for Cognitive Radio Ad Hoc Networks

    Get PDF
    Cooperation among cognitive radios for spectrum sensing is deemed essential for environments with deep shadows. In this paper, we study cooperative spectrum sensing for cognitive radio ad hoc networks where there is no fusion center to aggregate the information from various secondary users. We propose a novel consensus-inspired cooperative sensing scheme based on linear iterations that is fully distributed and low-cost. In addition, the tradeoffs on the number of consensus iterations are explored for scenarios with different shadow fading characteristics. Furthermore, we model insistent spectrum sensing data falsification (ISSDF) attack aimed at consensus-based iterative schemes and show its destructive effect on the cooperation performance which accordingly results in reduced spectrum efficiency and increased interference with primary users. We propose a trust management scheme to mitigate these attacks and evaluate the performance improvement through extensive Monte Carlo simulations for large-scale cognitive radio ad hoc networks in TV white space. Our proposed trust management reduces the harm of a set of collusive ISSDF attackers up to two orders of magnitude in terms of missed-detection and false alarm error rates. Moreover, in a hostile environment, integration of trust management into cooperative schemes considerably relaxes the sensitivity requirements on the cognitive radio devices

    On Random Sampling for Compliance Monitoring in Opportunistic Spectrum Access Networks

    Get PDF
    In the expanding spectrum marketplace, there has been a long term evolution towards more market€“oriented mechanisms, such as Opportunistic Spectrum Access (OSA), enabled through Cognitive Radio (CR) technology. However, the potential of CR technologies to revolutionize wireless communications, also introduces challenges based upon the potentially non€“deterministic CR behaviour in the Electrospace. While establishing and enforcing compliance to spectrum etiquette rules are essential to realization of successful OSA networks in the future, there has only been recent increased research activity into enforcement. This dissertation presents novel work on the spectrum monitoring aspect, which is crucial to effective enforcement of OSA. An overview of the challenges faced by current compliance monitoring methods is first presented. A framework is then proposed for the use of random spectral sampling techniques to reduce data collection complexity in wideband sensing scenarios. This approach is recommended as an alternative to Compressed Sensing (CS) techniques for wideband spectral occupancy estimation, which may be difficult to utilize in many practical congested scenarios where compliance monitoring is required. Next, a low€“cost computational approach to online randomized temporal sensing deployment is presented for characterization of temporal spectrum occupancy in cognitive radio scenarios. The random sensing approach is demonstrated and its performance is compared to CS€“based approach for occupancy estimation. A novel frame€“based sampling inversion technique is then presented for cases when it is necessary to track the temporal behaviour of individual CRs or CR networks. Parameters from randomly sampled Physical Layer Convergence Protocol (PLCP) data frames are used to reconstruct occupancy statistics, taking account of missed frames due to sampling design, sensor limitations and frame errors. Finally, investigations into the use of distributed and mobile spectrum sensing to collect spatial diversity to improve the above techniques are presented, for several common monitoring tasks in spectrum enforcement. Specifically, focus is upon techniques for achieving consensus in dynamic topologies such as in mobile sensing scenarios

    Non-convex distributed power allocation games in cognitive radio networks

    Get PDF
    In this thesis, we explore interweave communication systems in cognitive radio networks where the overall objective is to maximize the sum-rate of each cognitive radio user by optimizing jointly both the detection operation based on sensing and the power allocation across channels, taking into account the influence of the sensing accuracy and the interference limitation to the primary users. The optimization problem is addressed in single and multiuser cognitive radio networks for both single-input single-output and multi-input multi-output channels. Firstly, we study the resource allocation optimization problem for single-input single-output single user cognitive radio networks, wherein the cognitive radio aims at maximizing its own sum-rate by jointly optimizing the sensing information and power allocation over all the channels. In this framework, we consider an opportunistic spectrum access model under interweave systems, where a cognitive radio user detects active primary user transmissions over all the channels, and decides to transmit if the sensing results indicate that the primary user is inactive at this channel. However, due to the sensing errors, the cognitive users might access the channel when it is still occupied by active primary users, which causes harmful interference to both cognitive radio users and primary users. This motivates the introduction of a novel interference constraint, denoted as rate-loss gap constraint, which is proposed to design the power allocation, ensuring that the performance degradation of the primary user is bounded. The resulting problem is non-convex, thus, an exhaustive optimization algorithm and an alternating direction optimization algorithm are proposed to solve the problem efficiently. Secondly, the resource allocation problem for a single-input single-output multiuser cognitive radio network under a sensing-based spectrum sharing scheme is analyzed as a strategic non-cooperative game, where each cognitive radio user is selfish and strives to use the available spectrum in order to maximize its own sum-rate by considering the effect of imperfect sensing information. The resulting game-theoretical formulations belong to the class of non-convex games. A distributed cooperative sensing scheme based on a consensus algorithm is considered in the proposed game, where all the cognitive radio users can share their sensing information locally. We start with the alternating direction optimization algorithm, and prove that the local Nash equilibrium is achieved by the alternating direction optimization algorithm. In the next step, we use a new relaxed equilibrium concept, namely, quasi-Nash equilibrium for the non-convex game. The analysis of the sufficient conditions for the existence of the quasi-Nash equilibrium for the proposed game is provided. Furthermore, an iterative primal-dual interior point algorithm that converges to a quasi-Nash equilibrium of the proposed game is also proposed. From the simulation results, the proposed algorithm is shown to yield a considerable performance improvement in terms of the sum-rate of each cognitive radio user, with respect to previous state-of-the-art algorithms. Finally, we investigate a multiple-input multiple-output multiuser cognitive radio network under the opportunistic spectrum access scheme. We focus on the throughput of each cognitive radio user under correct sensing information, and exclude the throughput due to the erroneous decision of the cognitive radio users to transmit over occupied channels. The optimization problem is analyzed as a strategic non-cooperative game, where the transmit covariance matrix, sensing time, and detection threshold are considered as multidimensional variables to be optimized jointly. We also use the new relaxed equilibrium concept quasi-Nash equilibrium and prove that the proposed game can achieve a quasi-Nash equilibrium under certain conditions, by making use of the variational inequality method. In particular, we prove theoretically the sufficient condition of the existence and the uniqueness of the quasi-Nash equilibrium for this game. Furthermore, a possible extension of this work considering equal sensing time is also discussed. Simulation results show that the iterative primal-dual interior point algorithm is an efficient solution that converges to the quasi-Nash equilibrium of the proposed game

    Byzantine Attack and Defense in Cognitive Radio Networks: A Survey

    Full text link
    The Byzantine attack in cooperative spectrum sensing (CSS), also known as the spectrum sensing data falsification (SSDF) attack in the literature, is one of the key adversaries to the success of cognitive radio networks (CRNs). In the past couple of years, the research on the Byzantine attack and defense strategies has gained worldwide increasing attention. In this paper, we provide a comprehensive survey and tutorial on the recent advances in the Byzantine attack and defense for CSS in CRNs. Specifically, we first briefly present the preliminaries of CSS for general readers, including signal detection techniques, hypothesis testing, and data fusion. Second, we analyze the spear and shield relation between Byzantine attack and defense from three aspects: the vulnerability of CSS to attack, the obstacles in CSS to defense, and the games between attack and defense. Then, we propose a taxonomy of the existing Byzantine attack behaviors and elaborate on the corresponding attack parameters, which determine where, who, how, and when to launch attacks. Next, from the perspectives of homogeneous or heterogeneous scenarios, we classify the existing defense algorithms, and provide an in-depth tutorial on the state-of-the-art Byzantine defense schemes, commonly known as robust or secure CSS in the literature. Furthermore, we highlight the unsolved research challenges and depict the future research directions.Comment: Accepted by IEEE Communications Surveys and Tutoiral
    corecore