9,538 research outputs found
Reduced Complexity Optimal Hard Decision Fusion under Neyman-Pearson Criterion
Distributed detection is an important part of many of the applications like wireless sensor networks,
cooperative spectrum sensing in the cognitive radio network. Traditionally optimal non-randomized
hard decision fusion rule under Neyman Pearson(NP) criterion is exponential in complexity. But
recently [4] this was solved using dynamic programming. As mentioned in [4] that decision fusion
problem exhibits semi-monotonic property in a special case. We use this property in our simulations
and eventually apply dynamic programming to solve the problem with further reduced complexity.
Further, we study the e�ect of using multiple antennas at FC with reduced complexity rule
Distributed Binary Detection over Fading Channels: Cooperative and Parallel Architectures
This paper considers the problem of binary distributed detection of a known
signal in correlated Gaussian sensing noise in a wireless sensor network, where
the sensors are restricted to use likelihood ratio test (LRT), and communicate
with the fusion center (FC) over bandwidth-constrained channels that are
subject to fading and noise. To mitigate the deteriorating effect of fading
encountered in the conventional parallel fusion architecture, in which the
sensors directly communicate with the FC, we propose new fusion architectures
that enhance the detection performance, via harvesting cooperative gain
(so-called decision diversity gain). In particular, we propose: (i) cooperative
fusion architecture with Alamouti's space-time coding (STC) scheme at sensors,
(ii) cooperative fusion architecture with signal fusion at sensors, and (iii)
parallel fusion architecture with local threshold changing at sensors. For
these schemes, we derive the LRT and majority fusion rules at the FC, and
provide upper bounds on the average error probabilities for homogeneous
sensors, subject to uncorrelated Gaussian sensing noise, in terms of
signal-to-noise ratio (SNR) of communication and sensing channels. Our
simulation results indicate that, when the FC employs the LRT rule, unless for
low communication SNR and moderate/high sensing SNR, performance improvement is
feasible with the new fusion architectures. When the FC utilizes the majority
rule, such improvement is possible, unless for high sensing SNR
Byzantine Attack and Defense in Cognitive Radio Networks: A Survey
The Byzantine attack in cooperative spectrum sensing (CSS), also known as the
spectrum sensing data falsification (SSDF) attack in the literature, is one of
the key adversaries to the success of cognitive radio networks (CRNs). In the
past couple of years, the research on the Byzantine attack and defense
strategies has gained worldwide increasing attention. In this paper, we provide
a comprehensive survey and tutorial on the recent advances in the Byzantine
attack and defense for CSS in CRNs. Specifically, we first briefly present the
preliminaries of CSS for general readers, including signal detection
techniques, hypothesis testing, and data fusion. Second, we analyze the spear
and shield relation between Byzantine attack and defense from three aspects:
the vulnerability of CSS to attack, the obstacles in CSS to defense, and the
games between attack and defense. Then, we propose a taxonomy of the existing
Byzantine attack behaviors and elaborate on the corresponding attack
parameters, which determine where, who, how, and when to launch attacks. Next,
from the perspectives of homogeneous or heterogeneous scenarios, we classify
the existing defense algorithms, and provide an in-depth tutorial on the
state-of-the-art Byzantine defense schemes, commonly known as robust or secure
CSS in the literature. Furthermore, we highlight the unsolved research
challenges and depict the future research directions.Comment: Accepted by IEEE Communications Surveys and Tutoiral
Fully Distributed Cooperative Spectrum Sensing for Cognitive Radio Networks
Cognitive radio networks (CRN) sense spectrum occupancy and manage themselves to operate in unused bands without disturbing licensed users. The detection capability of a radio system can be enhanced if the sensing process is performed jointly by a group of nodes so that the effects of wireless fading and shadowing can be minimized. However, taking a collaborative approach poses new security threats to the system as nodes can report false sensing data to force a wrong decision. Providing security to the sensing process is also complex, as it usually involves introducing limitations to the CRN applications. The most common limitation is the need for a static trusted node that is able to authenticate and merge the reports of all CRN nodes. This paper overcomes this limitation by presenting a protocol that is suitable for fully distributed scenarios, where there is no static trusted node
- …